p0dalirius / owabrute
Hydra wrapper for bruteforcing Microsoft Outlook Web Application.
☆67Updated last year
Alternatives and similar repositories for owabrute:
Users that are interested in owabrute are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- A collection of python scripts to work with Windows Hives.☆15Updated last week
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆103Updated 3 weeks ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆19Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- linikatz is a tool to attack AD on UNIX☆142Updated last year
- ☆96Updated 2 years ago
- ☆34Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆101Updated 2 years ago
- Inject RDPThief into memory with PowerShell.☆60Updated last month
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 3 weeks ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆67Updated 11 months ago
- Azure Service Subdomain Enumeration☆52Updated 5 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆90Updated 8 months ago
- My Favorite Offensive Security Scripts☆66Updated last year
- Generate graphs and charts based on password cracking result☆156Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆22Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆106Updated 3 weeks ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- ☆79Updated last month
- Red Team "Drop and Run" NAC (802.1x) Bypass☆70Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- ☆18Updated 9 months ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆55Updated 2 years ago
- CLI monitor for windows process- & file activity☆81Updated 4 years ago