User enumeration and password spraying tool for testing Azure AD
☆71Mar 3, 2022Updated 4 years ago
Alternatives and similar repositories for SSOh-No
Users that are interested in SSOh-No are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- ☆255Sep 28, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆254Mar 7, 2022Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- ☆142May 4, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Beacon Object Files for roasting Active Directory☆237Feb 21, 2022Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆488Sep 24, 2025Updated 6 months ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆232Jun 17, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆483Jul 9, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆199Aug 28, 2025Updated 7 months ago
- Azure JWT Token Manipulation Toolset☆723Dec 6, 2024Updated last year
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 4 years ago
- ☆143Oct 31, 2023Updated 2 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆220Apr 1, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆395Feb 23, 2024Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆370Jun 24, 2025Updated 9 months ago
- ☆109Feb 21, 2023Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- ☆430Apr 22, 2025Updated 11 months ago
- ☆481Nov 20, 2022Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A proof-of-concept malicious Chrome extension☆93Jul 19, 2022Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,068Mar 20, 2026Updated 3 weeks ago