sse-secure-systems / TeamsEnum
User Enumeration of Microsoft Teams users via API
☆117Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for TeamsEnum
- ☆171Updated 9 months ago
- Finding all things on-prem Microsoft for password spraying and enumeration.☆249Updated 2 years ago
- ☆275Updated last week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆130Updated 3 months ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆188Updated last month
- Retired TrustedSec Capabilities☆225Updated last month
- A tool for pointesters to find candies in SharePoint☆237Updated 2 years ago
- Python3 terminal application that contains 405 Neo4j cyphers for BloodHound data sets and 388 GUI cyphers☆373Updated last month
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- Generate graphs and charts based on password cracking result☆153Updated last year
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆106Updated 4 months ago
- A Azure Exploitation Toolkit for Red Team & Pentesters☆147Updated last year
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆315Updated 5 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆129Updated 2 months ago
- Some scripts to abuse kerberos using Powershell☆312Updated last year
- A Red Team Activity Hub☆171Updated this week
- Custom Queries - Brought Up to BH4.1 syntax☆228Updated last week
- ☆180Updated last month
- Azure mindmap for penetration tests☆161Updated 11 months ago
- Modular Enumeration and Password Spraying Framework☆109Updated 6 months ago
- ☆120Updated 4 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆366Updated last year
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆130Updated last year
- Identify the attack paths in BloodHound breaking your AD tiering☆307Updated 2 years ago
- Make everyone in your VLAN ASRep roastable☆135Updated 4 months ago
- Azure AD cheatsheet for the CARTP course☆96Updated 2 years ago
- ☆169Updated last month
- ☆99Updated 3 years ago
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆196Updated 10 months ago
- ☆134Updated 3 weeks ago