Phishing Abusing Microsoft 365 OAuth Authorization Flow
☆25Dec 17, 2021Updated 4 years ago
Alternatives and similar repositories for Microsoft365_devicePhish
Users that are interested in Microsoft365_devicePhish are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A OSINT tool to obtain a target's phone number just by having his email address☆32Sep 16, 2019Updated 6 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- An OSINT employee/username enumeration tool☆67Dec 15, 2025Updated 4 months ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆107Aug 17, 2021Updated 4 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- Research into the lack of padding for responses in pwned passwords☆11Feb 11, 2020Updated 6 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated 2 months ago
- PACK (Password Analysis and Cracking Kit) (Python 3 fork + bug fixes)☆13Apr 12, 2023Updated 3 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Simple script to test for clickjacking☆23Jun 21, 2021Updated 4 years ago
- OSINT tool to find info about your old pages.☆20Mar 19, 2022Updated 4 years ago
- ☆34May 18, 2023Updated 2 years ago
- Example of an over all attack using DLL_Wrapper.☆11Aug 22, 2017Updated 8 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 8 months ago
- Windows kernel☆12Oct 15, 2020Updated 5 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- DPX - the Doge Packer for eXecutables☆30Dec 21, 2021Updated 4 years ago
- Execute embedded Mimikatz☆13Nov 24, 2021Updated 4 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12May 28, 2021Updated 4 years ago
- Marlin is an optimized firmware for RepRap 3D printers based on the Arduino platform. | Many commercial 3D printers come with Marlin inst…☆16Jul 20, 2021Updated 4 years ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- Versão mais simples e compacta da famosa sp_WhoIsActive do Adam Machanic.☆12Oct 11, 2022Updated 3 years ago
- ☆12Jan 20, 2025Updated last year
- Fly into Gophish with One Click (Infra Automation)☆53Mar 30, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆39Nov 24, 2022Updated 3 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Windows process injection methods☆19Jul 18, 2021Updated 4 years ago
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated 2 years ago
- A BurpSuite extension that allows you to use Chromium with PwnFox☆45Dec 23, 2025Updated 3 months ago
- // ==UserScript== // @name AposLauncher // @namespace AposLauncher // @include http://agar.io/* // @version 3.062 // @gr…☆21Jul 26, 2015Updated 10 years ago