sse-secure-systems / TeamsEnum
User Enumeration of Microsoft Teams users via API
☆138Updated 10 months ago
Alternatives and similar repositories for TeamsEnum:
Users that are interested in TeamsEnum are comparing it to the libraries listed below
- ☆176Updated 2 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆192Updated last week
- Azure mindmap for penetration tests☆175Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆142Updated 2 months ago
- ☆132Updated 7 months ago
- A tool for pointesters to find candies in SharePoint☆242Updated 2 years ago
- ☆177Updated 2 months ago
- ☆309Updated 3 months ago
- ☆187Updated 4 months ago
- Custom Queries - Brought Up to BH4.1 syntax☆241Updated 3 months ago
- Azure DevOps Services Attack Toolkit☆267Updated 6 months ago
- Some scripts to abuse kerberos using Powershell☆327Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆300Updated last month
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆243Updated 3 weeks ago
- ☆103Updated 3 years ago
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆375Updated 4 months ago
- Azure AD cheatsheet for the CARTP course☆104Updated 2 years ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆342Updated 8 months ago
- A Red Team Activity Hub☆188Updated this week
- Retired TrustedSec Capabilities☆244Updated 2 months ago
- Azure Post Exploitation Framework☆163Updated 3 weeks ago
- Modular Enumeration and Password Spraying Framework☆115Updated 10 months ago
- ☆102Updated last year
- Parses Snaffler output file and generate beautified outputs.☆71Updated 3 weeks ago
- Identify the attack paths in BloodHound breaking your AD tiering☆314Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆377Updated last year
- A Azure Exploitation Toolkit for Red Team & Pentesters☆167Updated last year
- Timeroasting scripts by Tom Tervoort☆265Updated last year
- ☆139Updated 2 months ago
- Make everyone in your VLAN ASRep roastable☆177Updated this week