Go365
Office 365 Exploiter
A tool designed to exploit vulnerabilities in Office 365 authentication systems
An Office365 User Attack Tool
626 stars
23 watching
101 forks
Language: Go
last commit: 11 months ago Related projects:
Repository | Description | Stars |
---|---|---|
| A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 94 |
| Tool to enumerate valid Office 365 usernames | 248 |
| An O365 investigation framework providing tools and analysis techniques for analyzing Office 365 logs to aid in security investigations. | 81 |
| Automates searches for exploits and vulnerabilities across multiple databases | 988 |
| Automates scanning and exploitation of Local File Inclusion vulnerabilities using various methods. | 1,715 |
| A toolkit for simulating phishing attacks on Office 365 accounts | 1,043 |
| A tool designed to analyze and exploit vulnerabilities in containers for pentesters and engineers | 654 |
| A tool for exploiting XXE vulnerabilities in various file formats | 1,049 |
| A tool designed to extract and manage audit logs from Office 365 environments. | 259 |
| Automates exploitation of XXE vulnerability using various methods to retrieve files and data from vulnerable applications. | 1,556 |
| A tool designed to bypass wired 802.1x protection and grant access to target networks for penetration tests and offensive engagements. | 233 |
| A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 59 |
| A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. | 458 |
| A collection of tools and techniques for exploiting vulnerabilities in Google services | 45 |
| Script to validate Office 365 email addresses without requiring login credentials | 328 |