sse-secure-systems / TeamsEnumLinks
User Enumeration of Microsoft Teams users via API
☆177Updated last year
Alternatives and similar repositories for TeamsEnum
Users that are interested in TeamsEnum are comparing it to the libraries listed below
Sorting:
- ☆182Updated 11 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆209Updated 3 weeks ago
- Azure AD cheatsheet for the CARTP course☆136Updated 3 years ago
- A tool to query for the existence of pre-windows 2000 computer objects.☆356Updated 2 weeks ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆159Updated 11 months ago
- A tool for pointesters to find candies in SharePoint☆267Updated 3 years ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆193Updated last year
- Proof of concept: using a Cloudflare worker for AITM attacks☆135Updated 9 months ago
- A Red Team Activity Hub☆224Updated this week
- ☆153Updated 7 months ago
- Some scripts to abuse kerberos using Powershell☆345Updated 2 years ago
- ☆131Updated 4 months ago
- Retired TrustedSec Capabilities☆248Updated 11 months ago
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆400Updated last year
- ☆264Updated 3 months ago
- ☆214Updated 5 months ago
- ☆191Updated 2 years ago
- Your template-based BloodHound terminal companion tool☆433Updated 2 months ago
- ☆188Updated 11 months ago
- ☆173Updated 7 months ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆177Updated 4 months ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆247Updated 2 months ago
- Abusing Azure services over C2☆363Updated 5 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆147Updated 2 years ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆165Updated 2 years ago
- ☆105Updated 2 years ago
- A BloodHound collector for Microsoft Configuration Manager☆350Updated 4 months ago
- Azure mindmap for penetration tests☆191Updated last year