securebinary / o365sprayerLinks
An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.
☆48Updated 3 years ago
Alternatives and similar repositories for o365sprayer
Users that are interested in o365sprayer are comparing it to the libraries listed below
Sorting:
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated this week
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆98Updated last month
- ☆91Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆70Updated last year
- ☆25Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- Azure Service Subdomain Enumeration☆68Updated last year
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆58Updated 3 years ago
- ☆43Updated 8 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated last month
- ☆54Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- A command-line utility for performing reverse DNS lookups☆74Updated 2 years ago
- ☆76Updated 2 weeks ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆84Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated 2 years ago
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year