OtterHacker

Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens

10
0
69% credibility
Found Mar 03, 2026 at 10 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
PowerShell
AI Summary

Two graphical Windows tools for authorized security testers to browse, search, preview, and download emails from mailboxes or files from SharePoint and OneDrive in Microsoft 365 environments.

How It Works

1
🔍 Discover the tools

You learn about these user-friendly programs that help security testers safely check a company's cloud email and file storage for weaknesses.

2
📋 Get special permission

You obtain written approval from the company owner, along with setup details to access their cloud services securely.

3
Choose your testing area
📧
Email checker

Focus on mailboxes, messages, and attachments.

📁
File checker

Focus on shared folders, drives, and documents.

4
🚀 Open the program

Double-click the simple Windows program file to launch a clear, graphical window on your computer.

5
🔗 Connect to the cloud

Enter the provided organization details to link up smoothly and start exploring right away.

6
🔎 Browse and gather info

Easily search for keywords, preview content, download files or emails, and note important findings in a helpful log.

Test complete

You finish your security review with all the needed details, ready to write a report that helps protect the company's data.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 10 to 10 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is M365Pwned?

M365Pwned delivers two PowerShell WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments via application-level OAuth tokens over Microsoft Graph API—no user logins needed. One lets you browse Exchange Online mailboxes, hunt credentials in emails, preview HTML with inline images, download attachments in bulk, and send impersonation replies. The other maps SharePoint sites and OneDrive drives, runs full-text file searches, and pulls documents with previews, solving stealthy data access for authorized red team ops.

Why is it gaining traction?

Its dead-simple GUIs beat clunky CLI Graph scripts, with pass-the-token auth, sovereign cloud region support, and real-time API logs for debugging without code tweaks. Fallback searches and OPSEC tweaks like offline image embedding stand out for low-footprint exfil, pulling devs from verbose PowerShell one-liners. Even at 10 stars, the no-PS7 requirement and WinForms two-way binding for fluid browsing hook M365 testers fast.

Who should use this?

Red teamers enumerating M365 tenants during pentests with pre-approved app registrations. Pentesters hunting passwords in mailboxes or configs in drives, prepping lateral phishing, or scoping blast radius. Security researchers validating Graph permissions in enterprise environments.

Verdict

Grab it for M365 red teaming if you have explicit permission—features and docs punch above its 10 stars and 0.7% credibility score. Early-stage maturity means lab-test first; misuse risks CFAA violations.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.