Power Pwn is an offensive and defensive security toolset for Microsoft 365 Power Platform and AI services.
Key Features, among others:
- πΎ PowerDump: Comprehensive tenant scanning and data collection
- π Copilot Studio Hunter: Discover and test misconfigured Copilot Studio bots exposed to unauthenticated users
- π€ Custom GPT Hunter: Enumerate and analyze custom GPTs and agent builders
- π LLM Hound: Discover publicly exposed AI agents across the internet using Shodan
- π― Copilot M365: Test Microsoft 365 Copilot for unauthorized data retrieval
- π Power Pages: Identify misconfigured Power Pages that leak Dataverse tables
Please review the tools documentation for the full list of features:
Check out our Wiki for comprehensive documentation, guides, and related talks!
A review of Power Pwn's PowerDump module is available here:
For standard usage, install with:
pip install powerpwnFor developers and advanced usage, see our comprehensive Installation Guide which covers:
- Full automated installation (Python + external tools)
- Module-specific dependencies (ffuf, subfinder, Node.js, Puppeteer)
- Platform-specific instructions (macOS, Linux, Windows)
- Troubleshooting and verification steps
Some modules require additional tools. Please review the following Wiki pages for module-specific requirements:
- Powerdump
- Copilot Studio Hunter - deep-scan
- Copilot Studio Hunter - tools-recon
- Copilot Studio Hunter - enum
- CopilotM365
Install Python packages and external tools (ffuf, subfinder, Node.js):
python init_repo.py --install-external-tools
source .venv/bin/activate # Linux/macOS
# or
.\.venv\Scripts\activate # WindowsSupported on macOS and Linux. Windows requires manual tool installation.
Install Python packages only (manual tool installation needed later):
python init_repo.py
source .venv/bin/activate # Linux/macOSpip install .
powerpwn --helpFor detailed installation options, troubleshooting, and platform-specific guides, see INSTALLATION.md
-
Editable Mode: If local changes aren't reflected when testing, reinstall in editable mode:
pip install -e . -
Python Version: Use Python 3.11 for GUI modules (PowerDump) to avoid compatibility issues.
-
PYTHONPATH Setup (if needed):
- Linux/macOS:
export PYTHONPATH=/[your_powerpwn_directory]/src:$PYTHONPATH - Windows PowerShell:
$env:PYTHONPATH = "C:\[your_powerpwn_directory]\src;" + $env:PYTHONPATH
- Linux/macOS:
-
Code Formatting: Before submitting PRs, run:
black -C -l 150 {file_path}
Start with PowerDump to scan your Microsoft 365 tenant for security issues and collect comprehensive data.
Evaluate your M365 Copilot deployment for unauthorized data retrieval:
- Copilot M365 - whoami: Identify user context and permissions
- Copilot M365 - dump: Test data exfiltration scenarios
Test for misconfigured Copilot Studio bots accessible to unauthenticated users:
- Copilot Studio Hunter - deep-scan: Deep security analysis
- Copilot Studio Hunter - tools-recon: Discover bot capabilities
- Copilot Studio Hunter - enum: Enumerate available bots
Identify misconfigured Power Pages that could leak Dataverse tables.
Please review the Wiki for a complete module list, detailed usage instructions, and advanced scenarios.


