(kinda) Malicious Outlook Reader
☆19Mar 2, 2021Updated 5 years ago
Alternatives and similar repositories for BadOutlook
Users that are interested in BadOutlook are comparing it to the libraries listed below
Sorting:
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Mar 22, 2021Updated 4 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆38Dec 5, 2025Updated 2 months ago
- Gophish companion script for sms phishing.☆19Dec 10, 2019Updated 6 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- ☆21Feb 27, 2021Updated 5 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆11Oct 24, 2022Updated 3 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- ☆33May 11, 2021Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 4 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- Get-MiniTimeline - Triage Collection and Timeline Generation w/ KAPE☆33May 25, 2024Updated last year
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 7 months ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Aug 17, 2021Updated 4 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Jul 19, 2022Updated 3 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- automated supported EAP method fingerprinting tool for WPA2-Enterprise wireless networks☆17Feb 19, 2023Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Steve McCanne's Sharkfest '21 Talk☆16Oct 12, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago