p0dalirius / owabruteLinks
Hydra wrapper for bruteforcing Microsoft Outlook Web Application.
☆70Updated last year
Alternatives and similar repositories for owabrute
Users that are interested in owabrute are comparing it to the libraries listed below
Sorting:
- A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application☆106Updated 7 months ago
- Azure Service Subdomain Enumeration☆66Updated last year
- ☆92Updated 2 years ago
- ☆47Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆36Updated 3 months ago
- a map for the azure oriented pentests☆66Updated 2 years ago
- Python script for extracting and decrypting Group Policy Preferences passwords☆25Updated 4 years ago
- A python script to dump files and folders remotely from a Windows SMB share.☆229Updated 7 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- ☆90Updated 7 months ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- ☆22Updated last year
- ☆38Updated 4 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆111Updated last month
- ☆44Updated 2 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆78Updated last year
- A little cheatsheet for NetExec☆25Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆21Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Tool for enumerating Active Directory environments☆49Updated 2 years ago