Gather information from an email address connected to Office 365
☆89Apr 24, 2023Updated 2 years ago
Alternatives and similar repositories for recon365
Users that are interested in recon365 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- ☆36Sep 25, 2022Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird …☆15Feb 13, 2024Updated 2 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- VisualStudio port of https://github.com/guervild/BOFs/tree/dev/SilentLsassDump☆24Jul 6, 2023Updated 2 years ago
- ☆28Jan 9, 2023Updated 3 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆73Oct 22, 2025Updated 5 months ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- Python 3 script to dump/scrape/extract company employees from XING API☆39Feb 12, 2026Updated last month
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- BOF to terminate a process via PID as argument☆28Sep 7, 2025Updated 6 months ago
- In-memory hiding technique☆63Jan 5, 2025Updated last year
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- ☆13Jul 5, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆35May 25, 2025Updated 9 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- ☆27Jan 5, 2023Updated 3 years ago
- ☆12Dec 16, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆19Aug 3, 2023Updated 2 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Repository of Microsoft Driver Block Lists based off of OS-builds☆43Apr 14, 2024Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago