MSSprinkler is a password spraying utility for organizations to test their M365 accounts from an external perspective.
It employs a ‘low-and-slow’ approach to avoid locking out accounts, and provides verbose information related to accounts and tenant information.
MSSprinkler is written in PowerShell and can be imported directly as a module. It has no other dependencies.
MSSprinkler relies on the verbose error messaging provided by Microsoft to identify additional information beyond standard password spray success or failed authentication attempts, which allows for the gathering of additional information related to the user account.
MSSprinkler also allows for a configurable threshold to prevent locking out accounts by mistake.
By default, this is set to 8 (n-2 under Microsoft’s default) however this can be adjusted based on the organizations lockout policy.
Additionally, successful sign-in to an account with MFA enabled will not produce an MFA push to the user, allowing for covert information gathering.
# Import the module
Import-Module MSSprinkler.ps1
# Spray using a provided userlist and password list, default URL and threshold
Invoke-MSSprinkler -user userlist.txt -pass passwordlist.txt
# Spray using a provided userlist and password list, increase threshold to 12 attempts per min and output results to output.csv
Invoke-MSSprinkler -user userlist.txt -pass passwordlist.txt -threshold 12 -output .\output.csv
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…