SprayingToolkit
SprayingToolkit copied to clipboard
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
https://pastebin.com/HhN2hPFA 
Otherwise, the following error will occur ``` In file included from src/lxml/etree.c:692: src/lxml/includes/etree_defs.h:14:10: fatal error: libxml/xmlversion.h: No such file or directory 14 | #include "libxml/xmlversion.h" | ^~~~~~~~~~~~~~~~~~~~~ compilation terminated. Compile...
Any chance of supporting spraying against ADFS portals, and perhaps detection of users who have 2FA enabled/disabled/in enrollment?
 getting this error when targeting imap which I believe is using a self signed certificate.
This PR addresses two bugs: 1) The google and bing lxml parsers fail to find any matches (the syntax is still correct, so heaven only knows why it stopped working)....
Most of the time, the `WWW-Authentication` header comes back looking like this: ``` 'WWW-Authenticate': 'NTLM TlA=, Negotiate, Basic realm="autodiscover.site.com"' ``` The original code handled this fine. However, sometimes the header...
I spent some time making a setup.py file to more easily install this tool, because it makes packaging this tool easier. And wouldn't it be nice to install this tool...
Checks if is a file, and prints a hint about adding --interval if you meant it to be a password file.
When a spray is finished, it shows a green plus even if no passwords are found. This got my hopes up, and then after I realized I had no valid...