CultCornholio / solenyaLinks
Microsoft365 Device Code Phishing Framework
☆37Updated 3 years ago
Alternatives and similar repositories for solenya
Users that are interested in solenya are comparing it to the libraries listed below
Sorting:
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 3 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated 2 years ago
- ☆71Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆22Updated 3 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆67Updated 11 months ago
- My BloodHound custom queries☆23Updated 2 years ago
- Find Inbound Email Domains☆23Updated last year
- Hiding your infrastructure from the boys in blue.☆22Updated 3 years ago
- A simple program to automate Microsoft OAuth device code phishing attacks.☆18Updated last year
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 11 months ago
- Scripts to interact with Microsoft Graph APIs☆40Updated 6 months ago
- ☆18Updated 7 months ago
- ☆25Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- ☆31Updated this week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆33Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 2 months ago
- Discord C2 Profile for Mythic☆29Updated 3 months ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆32Updated 2 months ago
- ☆58Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated last year
- Logging tool intended for red team usage☆29Updated 3 weeks ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 2 months ago