sse-secure-systems / TeamsEnum
User Enumeration of Microsoft Teams users via API
☆149Updated last year
Alternatives and similar repositories for TeamsEnum:
Users that are interested in TeamsEnum are comparing it to the libraries listed below
- ☆178Updated 4 months ago
- ☆142Updated 3 weeks ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆319Updated last month
- A tool for pointesters to find candies in SharePoint☆253Updated 2 years ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆277Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆265Updated 2 months ago
- Some scripts to abuse kerberos using Powershell☆328Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆194Updated 2 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated last year
- ☆106Updated 3 years ago
- Azure AD cheatsheet for the CARTP course☆109Updated 2 years ago
- ☆181Updated 4 months ago
- Retired TrustedSec Capabilities☆246Updated 4 months ago
- ☆88Updated this week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆145Updated 4 months ago
- ☆103Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆169Updated 7 months ago
- Modular Enumeration and Password Spraying Framework☆115Updated last year
- Azure mindmap for penetration tests☆181Updated last year
- ☆210Updated 2 weeks ago
- Identify the attack paths in BloodHound breaking your AD tiering☆318Updated 2 years ago
- ☆188Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆312Updated 3 months ago
- Azure DevOps Services Attack Toolkit☆289Updated last month
- Tool to extract powerful tokens from Office desktop apps memory☆71Updated last year
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆364Updated 10 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆383Updated 3 weeks ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆142Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆236Updated last week
- ☆190Updated 6 months ago