Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
M365Pwned Toolkit Enhances Microsoft 365 Exploitation

M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Posted on March 9, 2026 By CWS

A cybersecurity enthusiast known as OtterHacker has introduced M365Pwned, a set of user-friendly GUI tools aimed at extracting data from Microsoft 365 environments using OAuth tokens. These tools, designed for red team exercises, operate without the need for user intervention.

Overview of M365Pwned Tools

Constructed using PowerShell 5.1 and integrating with the Microsoft Graph API, the toolkit offers advanced capabilities for penetration testers and adversary simulators working within enterprise-level Microsoft 365 setups. The toolkit comprises two main components: MailPwned-GUI.ps1 and SharePwned-GUI.ps1, targeting Exchange Online and SharePoint, respectively.

These tools leverage a registered Azure Active Directory application with necessary permissions, supporting authentication through Client Secret, Certificate Thumbprint, and Raw Access Token methods.

Functionality and Capabilities

The MailPwned tool is equipped with features to navigate through Exchange Online, enabling operators to browse mailboxes, perform keyword searches, and retrieve emails with full HTML rendering. It also supports bulk attachment downloads and email impersonation, all while minimizing audit footprints.

SharePwned, on the other hand, allows users to access SharePoint sites across an enterprise, browse document libraries, and conduct file searches. It employs a fallback search mode when certain permissions are unavailable, ensuring comprehensive access to stored data.

Operational Security and Compliance

Both tools maintain operational security by ensuring all requests are logged under the registered application’s identity in Graph audit logs. Security teams are advised to review application permissions and monitor access for any unusual activity.

The toolkit also supports region-specific settings, enhancing its functionality across various geographic data centers. This adaptability is crucial for users operating in diverse regulatory environments.

For those interested in a command-line interface, a separate version of SharePwned is accessible on GitHub, courtesy of developer Ethical-Kaizoku.

Stay updated with the latest in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Azure AD, Cybersecurity, data exfiltration, ethical hacking, Exchange Online, Graph API, Microsoft 365, OAuth tokens, OneDrive, penetration testing, PowerShell, red teaming, security tools, SharePoint

Post navigation

Previous Post: Dangerous npm Package Steals macOS Credentials
Next Post: Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions

Related Posts

Windows 11 PCs Fail to Shut Down After January Security Update Windows 11 PCs Fail to Shut Down After January Security Update Cyber Security News
NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News
Detecting Ransomware with Windows Minifilter Technology Detecting Ransomware with Windows Minifilter Technology Cyber Security News
2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers 2.5 Million+ Malicious Request From Hackers Attacking Adobe ColdFusion Servers Cyber Security News
New Android Bug Impacts Volume Buttons Functionality with “Select to Speak” Enabled New Android Bug Impacts Volume Buttons Functionality with “Select to Speak” Enabled Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud
  • Signal Faces Surge in Phishing Attacks Against Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions
  • M365Pwned Toolkit Enhances Microsoft 365 Exploitation
  • Dangerous npm Package Steals macOS Credentials
  • Vietnam Cybercrime Network Fuels Global Account Fraud
  • Signal Faces Surge in Phishing Attacks Against Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News