Skip to content

A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.

License

Notifications You must be signed in to change notification settings

nickzer0/RagingRotator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RagingRotator

Go Report Card   Go

A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.

Sends login requests to https://login.microsoftonline.com/rst2.srf which returns error codes based on the status of the account. These error codes are documented here.

Usage

  -h            Print help information
  -user         Username for authentication
  -userfile     Path to a file containing a list of usernames
  -domain       Domain for authentication
  -pass         Password for authentication
  -passfile     Path to a file containing a list of passwords
  -userpassfile Path to a file containing a list of username:password pairs
  -delay        Delay between requests in seconds (default: 1)
  -output       Path to the output file for results
  -accesskey    AWS access key for API Gateway deployment
  -secretkey    AWS secret key for API Gateway deployment
  -cleanup		Cleans up unused AWS API Gateways, loops until complete

About

A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages