Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
M365Pwned Toolkit Enhances Microsoft 365 Exploitation

M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Posted on March 9, 2026 By CWS

A cybersecurity enthusiast known as OtterHacker has introduced M365Pwned, a set of user-friendly GUI tools aimed at extracting data from Microsoft 365 environments using OAuth tokens. These tools, designed for red team exercises, operate without the need for user intervention.

Overview of M365Pwned Tools

Constructed using PowerShell 5.1 and integrating with the Microsoft Graph API, the toolkit offers advanced capabilities for penetration testers and adversary simulators working within enterprise-level Microsoft 365 setups. The toolkit comprises two main components: MailPwned-GUI.ps1 and SharePwned-GUI.ps1, targeting Exchange Online and SharePoint, respectively.

These tools leverage a registered Azure Active Directory application with necessary permissions, supporting authentication through Client Secret, Certificate Thumbprint, and Raw Access Token methods.

Functionality and Capabilities

The MailPwned tool is equipped with features to navigate through Exchange Online, enabling operators to browse mailboxes, perform keyword searches, and retrieve emails with full HTML rendering. It also supports bulk attachment downloads and email impersonation, all while minimizing audit footprints.

SharePwned, on the other hand, allows users to access SharePoint sites across an enterprise, browse document libraries, and conduct file searches. It employs a fallback search mode when certain permissions are unavailable, ensuring comprehensive access to stored data.

Operational Security and Compliance

Both tools maintain operational security by ensuring all requests are logged under the registered application’s identity in Graph audit logs. Security teams are advised to review application permissions and monitor access for any unusual activity.

The toolkit also supports region-specific settings, enhancing its functionality across various geographic data centers. This adaptability is crucial for users operating in diverse regulatory environments.

For those interested in a command-line interface, a separate version of SharePwned is accessible on GitHub, courtesy of developer Ethical-Kaizoku.

Stay updated with the latest in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Azure AD, Cybersecurity, data exfiltration, ethical hacking, Exchange Online, Graph API, Microsoft 365, OAuth tokens, OneDrive, penetration testing, PowerShell, red teaming, security tools, SharePoint

Post navigation

Previous Post: Dangerous npm Package Steals macOS Credentials
Next Post: Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions

Related Posts

Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Four Hackers Arrested by UK Police for Attacks on M&S, Co-op and Harrods Stores Cyber Security News
Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Massive Phishing Attack Impersonate as Travel Brands Attacking Users with 4,300 Malicious Domains Cyber Security News
Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Google Gemini Vulnerabilities Let Attackers Exfiltrate User’s Saved Data and Location Cyber Security News
Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Cyber Security News
76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 76 Zero-day Vulnerabilities Uncovered by Hackers on Pwn2Own Automotive 2026 Cyber Security News
Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads Hackers Weaponized Open VSX Extension with Sophisticated Malware After Reaching 5066 Downloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Fake CleanMyMac Site Targets Users with SHub Stealer
  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Fake CleanMyMac Site Targets Users with SHub Stealer
  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News