bigb0sss / Microsoft365_devicePhish
Phishing Abusing Microsoft 365 OAuth Authorization Flow
☆20Updated 3 years ago
Alternatives and similar repositories for Microsoft365_devicePhish:
Users that are interested in Microsoft365_devicePhish are comparing it to the libraries listed below
- ☆47Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆40Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- sturdy-chainsaw☆57Updated last year
- Azure Service Subdomain Enumeration☆55Updated 6 months ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆44Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆164Updated 9 months ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆43Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆98Updated last year
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆18Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆30Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated 4 months ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Discord C2 Profile for Mythic☆27Updated 3 weeks ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- ☆16Updated 10 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- ☆26Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- Modular Enumeration and Password Spraying Framework☆116Updated 11 months ago
- ☆26Updated last year
- A script to automate keystrokes through a graphical desktop program.☆34Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year