sse-secure-systems / TeamsEnumLinks
User Enumeration of Microsoft Teams users via API
☆167Updated last year
Alternatives and similar repositories for TeamsEnum
Users that are interested in TeamsEnum are comparing it to the libraries listed below
Sorting:
- ☆179Updated 9 months ago
- A tool for pointesters to find candies in SharePoint☆262Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆203Updated 4 months ago
- ☆152Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆386Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆180Updated last year
- Some scripts to abuse kerberos using Powershell☆342Updated 2 years ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆188Updated last year
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆299Updated last week
- Azure AD cheatsheet for the CARTP course☆132Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆351Updated 3 months ago
- ☆106Updated last year
- Your template-based BloodHound terminal companion tool☆434Updated 3 weeks ago
- Retired TrustedSec Capabilities☆248Updated 9 months ago
- ☆211Updated 3 months ago
- A Red Team Activity Hub☆220Updated last month
- Proof of concept: using a Cloudflare worker for AITM attacks☆134Updated 7 months ago
- ☆246Updated last month
- Parses Snaffler output file and generate beautified outputs.☆107Updated 7 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆261Updated this week
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆241Updated 3 months ago
- Azure mindmap for penetration tests☆188Updated last year
- ☆190Updated 2 years ago
- ☆114Updated 2 months ago
- A BloodHound collector for Microsoft Configuration Manager☆345Updated 2 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆192Updated 11 months ago
- Azure DevOps Services Attack Toolkit☆298Updated 5 months ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆253Updated 5 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago