OSCP Certification
HomeAuthorPopLabSecDiscord
  • OSCP Guide - Offensive Security Certified Professional
  • OSCP Retake Policy
  • Company Info
    • Exam Rules
    • Tools NOT Allowed
    • Exam Topics
    • OSCP Exam Guide
  • TryHackMe Rooms
    • Overpass
      • Walkthrough
    • 🔗Vulnversity
      • Walkthrough
    • 💥Kenobi
      • ✅Kenobi
      • Walkthrough
  • VulnHub
    • Brainpan
    • Pinky's Palace v1
    • MrRobot
    • LazySysadmin
    • VulnOsv2
    • Pwnlab_init
    • Lordoftheroot
    • Kioptrix2014
  • HackTheBox Machines
    • Machines
    • Active
    • Bounty
    • Cronos
    • DevOops
    • Silo
    • Devel
    • Conceal
    • Blue
    • Bastard
  • Top Free Courses
    • Page 3
  • Reporting
    • Recommendations
    • Templates
  • Top Youtube Channels
    • John Hammond
  • Hacking Protocols
    • DNS - 53
    • Page
  • Tools Basics
    • Swaks
    • CyberChef
  • Information Gathering
    • pspy
    • Nmap
    • enum4linux
    • BloodHound
    • BloodHound Python
  • Vulnerability Analysis
    • Sparta
    • Nikto
  • Web Application Analysis
    • PayloadsAllTheThings
    • Leaky Paths
    • ysoserial
    • JSON Web Tokens
    • httpx
    • Gobuster
    • ffuf
    • Wfuzz
    • WPScan
  • Password Attacks
    • mimikatz
    • LaZagne
    • hashcat
    • John
    • Kerbrute
    • Patator
    • pypykatz
    • RsaCtfTool
    • CrackMapExec
    • SprayingToolkit
    • Hydra
    • Default Credentials
  • Reverse Engineering
    • dnSpy
    • ghidra
    • AvalonialLSpy
    • GEF
    • Radare2
    • cutter
    • pwndbg
    • peda
    • JD-GUI
  • Exploitation Tools
    • lsassy
    • printspoofer
    • Rubeus
    • pth-toolkit
    • Evil-WinRM
    • PowerSharpPack
    • SharpCollection
  • Post Exploitation
    • PEASS-ng
    • LinEnum
    • Windows Privilege Escalation
    • Priv2Admin
    • PowerView
    • powercat
    • Impacket
    • GTFOBins
    • WADComs
    • RunasCs
    • scavenger
    • Sherlock
    • WESNG
    • JAWS
    • Watson
    • LOLBAS
Powered by GitBook
On this page
  • Installing the SprayingToolkit
  • Usage

Was this helpful?

  1. Password Attacks

SprayingToolkit

Dive into our detailed article about the SprayingToolkit, a revolutionary tool enhancing spraying techniques. Get insights about its features, uses, and benefits. Enhance your spraying expertise.

PreviousCrackMapExecNextHydra

Last updated 1 year ago

Was this helpful?

Installing the SprayingToolkit

To install SprayingToolkit, run the following command:

git clone https://github.com/byt3bl33d3r/SprayingToolkit.git
cd SprayingToolkit
pip install -r requirements.txt

Usage

After installation, you can start using SprayingToolkit to perform password spraying attacks against various services. Below is an example of how to use SprayingToolkit with Exchange:

python spray.py -u users.txt -p Spring2023! -U domain\\username -url https://outlook.office365.com -t 5

Remember to stay within legal boundaries and use the tool for legitimate security testing purposes only.

Sign up to our mailing list to receive updates!
GitHub - byt3bl33d3r/SprayingToolkit: Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficientGitHub
Logo