User enumeration and password spraying tool for testing Azure AD
☆71Mar 3, 2022Updated 4 years ago
Alternatives and similar repositories for SSOh-No
Users that are interested in SSOh-No are comparing it to the libraries listed below
Sorting:
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Oct 18, 2022Updated 3 years ago
- ☆254Sep 28, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆252Mar 7, 2022Updated 4 years ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- ☆142May 4, 2022Updated 3 years ago
- Beacon Object Files for roasting Active Directory☆236Feb 21, 2022Updated 4 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆487Sep 24, 2025Updated 5 months ago
- Enumerate AWS cloud resources based on provided credential☆52May 11, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- AzureRT - A Powershell module implementing various Azure Red Team tactics☆231Jun 17, 2022Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆484Jul 9, 2024Updated last year
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆199Aug 28, 2025Updated 6 months ago
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- ☆145Oct 31, 2023Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆390Feb 23, 2024Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆368Jun 24, 2025Updated 8 months ago
- ☆109Feb 21, 2023Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- ☆429Apr 22, 2025Updated 10 months ago
- ☆479Nov 20, 2022Updated 3 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Feb 9, 2022Updated 4 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- A proof-of-concept malicious Chrome extension☆92Jul 19, 2022Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated last month