MailSniper
MIT๐ฅ Offensive Ops ยท PowerShell
MailSniper is a PowerShell tool for searching through email in Microsoft Exchange and Office 365 environments during penetration tests. It can log into mailboxes using stolen credentials and search for terms like 'password', 'creds', 'SSN', or custom keywords across the Global Address List. MailSniper supports Exchange Web Services (EWS), Exchange ActiveSync, and Office 365 REST API. It can enumerate valid usernames via timing attacks, perform password sprays against OWA/EWS, and extract valuable data from mail folders, contacts, and calendar entries. Essential for demonstrating email-based data exposure in enterprise assessments.
Installation
$ git clone https://github.com/dafthack/MailSniper.gitUse Cases
- Searching Exchange mailboxes for sensitive data during pentests
- Password spraying against OWA and EWS
- Enumerating valid Active Directory usernames
- Extracting credentials stored in email
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- PowerShell
- Repository
- dafthack/MailSniper
- License
- MIT
- Platforms
- ๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
CrackMapExec
PythonSwiss army knife for pentesting Active Directory. SMB, LDAP, MSSQL, WinRM enumeration and exploitation.
Compare MailSniper vs CrackMapExecMore in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.