optiv / Go365Links
An Office365 User Attack Tool
☆645Updated last year
Alternatives and similar repositories for Go365
Users that are interested in Go365 are comparing it to the libraries listed below
Sorting:
- A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment.☆448Updated 2 years ago
- Maximizing BloodHound. Max is a good boy.☆530Updated 9 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆448Updated 2 years ago
- User enumeration and password bruteforce on Azure, ADFS, OWA, O365, Teams and gather emails on Linkedin☆484Updated 4 months ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆500Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆309Updated 2 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆834Updated 3 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆367Updated 7 months ago
- onedrive user enumeration - pentest tool to enumerate valid o365 users☆741Updated 6 months ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Updated 3 years ago
- Username enumeration and password spraying tool aimed at Microsoft O365.☆974Updated last year
- Password spraying and bruteforcing tool for Active Directory Domain Services☆384Updated last year
- ☆751Updated last year
- Kerberoast attack -pure python-☆435Updated 2 years ago
- "Golden" certificates☆707Updated last year
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆609Updated 5 months ago
- A PowerShell armoury for security guys and girls☆468Updated 2 years ago
- Search tool to find specific files containing specific words, i.e. files containing passwords..☆742Updated 5 years ago
- Collection of PowerShell functions a Red Teamer may use in an engagement☆545Updated 2 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Updated 4 months ago
- Hide your payload in DNS☆618Updated 2 years ago
- Python script that performs email address validation against Office 365 without submitting login attempts.☆376Updated 5 years ago
- Azure JWT Token Manipulation Toolset☆708Updated last year
- Overlord - Red Teaming Infrastructure Automation☆628Updated last year
- WSuspicious - A tool to abuse insecure WSUS connections for privilege escalations☆372Updated 5 years ago
- scan for NTLM directories☆377Updated 5 months ago
- Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.☆482Updated last year
- ☆413Updated 2 years ago
- ☆824Updated 3 years ago