Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform

License

NotificationsYou must be signed in to change notification settings

mbrg/power-pwn

Repository files navigation

Maintained by:

Empower your business, not the adversaries.


Overview

powerpwnBlack HatSecTor 23Black HatDEFCON30

starstwitteremail me

Power Pwn is an offensive security toolset for Microsoft 365.Check out ourWiki for docs, guides and related talks!

An review of the tool's basic modules is available here:

BlackHat Arsenal USA 2023 - Power Pwn

Installation

  1. Install withpip install powerpwn.
  2. Please review the following modules'Wiki pages for additional installation dependencies:

Quick Guide for Developers

  1. Clone the repository and setup a virtual environment in your IDE. Install python packages by running:
  python init_repo.py
  1. If not active already, run the folloeing to activate the virtual environment (.venv):
  .\.venv\Scripts\activate (Windows)  source .venv/bin/activate (Linux & MacOS)
  1. Verify all dependencies are installed:
  pip install .

Notes:

  1. To handle the GUI properly, please use Python 3.8 for the above virtual environment, if it is not already the default.

  2. If the project directory isn't set up correctly you can use this command (or one similar to it) to set it up manually:

    • export PYTHONPATH=/[your_powerpwn_directory]/src:$PYTHONPATH (Linux)
    • $env:PYTHONPATH = "C:\[your_powerpwn_directory]\src;" + $env:PYTHONPATH (Windows PowerShell)
  3. To handle the PowerDump module's GUI properly, please use Python 3.8 for the abovepip version if it is not already the default. Alternatively, you can install the above within a Python 3.8 virtual environment.

  4. When pushing PR, you can runblack -C -l 150 {file to path} to fix any formatting issues related toblack.

Usage

Quick Start

  1. For quickly getting started with scanning your tenant, please check thepowerdump module here.
  2. For testing your M365 Copilot for retrieval of internal information (e.g., via a compromised user), please check the C365 modules:
  1. For testing misconfigured Copilot Studio bots available to unauthenticated users please check the Copilot Hunterdeep-scan modulehere.
  2. To test misconfigured Power Pages which could allow for Dataverse tables to be leak, please check thepowerpages module.

Please review theWiki for a full module list and detailed usage.


[8]ページ先頭

©2009-2025 Movatter.jp