optionalCTF / SSOh-NoLinks
User enumeration and password spraying tool for testing Azure AD
☆70Updated 3 years ago
Alternatives and similar repositories for SSOh-No
Users that are interested in SSOh-No are comparing it to the libraries listed below
Sorting:
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆92Updated last year
- ☆47Updated 3 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 3 years ago
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 6 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆76Updated 2 months ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Notification webhook for GoPhish☆54Updated last year
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Updated last year
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- ☆27Updated 2 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆40Updated 2 years ago
- Creates and sends fake meeting invite☆66Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- ☆23Updated 3 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆19Updated 2 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- Analyzing AD domains for security risks related to user accounts☆64Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆83Updated 2 years ago
- ☆52Updated last year
- ☆28Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- offensive notes & resources☆43Updated 3 months ago