optionalCTF / SSOh-NoLinks
User enumeration and password spraying tool for testing Azure AD
☆70Updated 3 years ago
Alternatives and similar repositories for SSOh-No
Users that are interested in SSOh-No are comparing it to the libraries listed below
Sorting:
- Convert ldapdomaindump to Bloodhound☆80Updated 2 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆102Updated 2 years ago
- ☆47Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆41Updated 2 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Creates and sends fake meeting invite☆74Updated 4 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆89Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 2 years ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆97Updated last year
- Analyzing AD domains for security risks related to user accounts☆64Updated 3 years ago
- ☆121Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- offensive notes & resources☆43Updated 9 months ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Updated last month
- ☆27Updated 2 years ago
- ☆37Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆19Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago