An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.
☆48Nov 17, 2022Updated 3 years ago
Alternatives and similar repositories for o365sprayer
Users that are interested in o365sprayer are comparing it to the libraries listed below
Sorting:
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Feb 8, 2025Updated last year
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- Developing an open source Windows EDR written in C & C++ & C#☆25Jun 27, 2025Updated 8 months ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated last year
- SHELLCTF 2021 WriteUps. A beginner-friendly CTF with an objective to get the enthusiastic students familiar with the basics, along with a…☆12Jun 7, 2021Updated 4 years ago
- ☆11Mar 7, 2021Updated 4 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86May 5, 2023Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- ☆18Sep 27, 2025Updated 5 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆132Sep 6, 2024Updated last year
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆130Feb 17, 2026Updated last week
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- ☆64Apr 20, 2022Updated 3 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- RootersCTF 2019 challenges☆18Oct 12, 2019Updated 6 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- CVE-2025-31324, SAP Exploit☆25Apr 28, 2025Updated 10 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- ☆20Dec 29, 2024Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆412Mar 21, 2025Updated 11 months ago
- This Repo help you to download most helpful GO tools on the system .☆22Dec 7, 2022Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Simple python program to execute terminal commands on telegram chats directly.☆44Nov 18, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 3 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- Fetch Javascript sourcemaps, bounty hunter style☆42May 21, 2023Updated 2 years ago