bigb0sss / Microsoft365_devicePhish
Phishing Abusing Microsoft 365 OAuth Authorization Flow
☆20Updated 3 years ago
Alternatives and similar repositories for Microsoft365_devicePhish:
Users that are interested in Microsoft365_devicePhish are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- ☆47Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆33Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- RedDrop is a quick and easy web server for capturing and processing encoded and encrypted payloads and tar archives.☆57Updated 4 months ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- Public repo of some woking evilginx phishlets☆32Updated 5 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- ☆40Updated last year
- Automated Evilginx phishlet creator Extension for Burpsuite☆49Updated 3 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- ☆27Updated last year
- Discord C2 Profile for Mythic☆28Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 2 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆68Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 months ago
- ☆34Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆167Updated 10 months ago
- sturdy-chainsaw☆57Updated last year
- AMSI Bypass for powershell☆30Updated 3 years ago