Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
M365Pwned Toolkit Enhances Microsoft 365 Exploitation

M365Pwned Toolkit Enhances Microsoft 365 Exploitation

Posted on March 9, 2026 By CWS

A cybersecurity enthusiast known as OtterHacker has introduced M365Pwned, a set of user-friendly GUI tools aimed at extracting data from Microsoft 365 environments using OAuth tokens. These tools, designed for red team exercises, operate without the need for user intervention.

Overview of M365Pwned Tools

Constructed using PowerShell 5.1 and integrating with the Microsoft Graph API, the toolkit offers advanced capabilities for penetration testers and adversary simulators working within enterprise-level Microsoft 365 setups. The toolkit comprises two main components: MailPwned-GUI.ps1 and SharePwned-GUI.ps1, targeting Exchange Online and SharePoint, respectively.

These tools leverage a registered Azure Active Directory application with necessary permissions, supporting authentication through Client Secret, Certificate Thumbprint, and Raw Access Token methods.

Functionality and Capabilities

The MailPwned tool is equipped with features to navigate through Exchange Online, enabling operators to browse mailboxes, perform keyword searches, and retrieve emails with full HTML rendering. It also supports bulk attachment downloads and email impersonation, all while minimizing audit footprints.

SharePwned, on the other hand, allows users to access SharePoint sites across an enterprise, browse document libraries, and conduct file searches. It employs a fallback search mode when certain permissions are unavailable, ensuring comprehensive access to stored data.

Operational Security and Compliance

Both tools maintain operational security by ensuring all requests are logged under the registered application’s identity in Graph audit logs. Security teams are advised to review application permissions and monitor access for any unusual activity.

The toolkit also supports region-specific settings, enhancing its functionality across various geographic data centers. This adaptability is crucial for users operating in diverse regulatory environments.

For those interested in a command-line interface, a separate version of SharePwned is accessible on GitHub, courtesy of developer Ethical-Kaizoku.

Stay updated with the latest in cybersecurity by following us on Google News, LinkedIn, and X. Reach out to us if you have stories to share.

Cyber Security News Tags:Azure AD, Cybersecurity, data exfiltration, ethical hacking, Exchange Online, Graph API, Microsoft 365, OAuth tokens, OneDrive, penetration testing, PowerShell, red teaming, security tools, SharePoint

Post navigation

Previous Post: Dangerous npm Package Steals macOS Credentials
Next Post: Iranian Cyber Attacks Target U.S. Infrastructure Amid Tensions

Related Posts

3 SOC Metrics Improved With Sandbox Analysis  3 SOC Metrics Improved With Sandbox Analysis  Cyber Security News
20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled 20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Chinese Threat Actors Using 2,800 Malicious Domains to Deliver Windows-Specific Malware Cyber Security News
Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Starbucks Faces Cyber Breach: 10GB Data Allegedly Stolen Cyber Security News
Google API Keys Risk Exposure to Private Data Google API Keys Risk Exposure to Private Data Cyber Security News
Fortinet Urges Immediate Patching for Critical Vulnerabilities Fortinet Urges Immediate Patching for Critical Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software
  • Pastebin PowerShell Script Targets Telegram Sessions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Targets Chinese Firms Exploiting AI Innovations
  • Hackers Target Developers with Fake Job Interviews
  • Unauthorized Mythos Access & CISA Nomination Withdrawal
  • NASA Targeted in Chinese Phishing Attack on Defense Software
  • Pastebin PowerShell Script Targets Telegram Sessions

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark