bigb0sss / Microsoft365_devicePhish
Phishing Abusing Microsoft 365 OAuth Authorization Flow
☆20Updated 3 years ago
Alternatives and similar repositories for Microsoft365_devicePhish
Users that are interested in Microsoft365_devicePhish are comparing it to the libraries listed below
Sorting:
- ☆47Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆34Updated last month
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Azure Service Subdomain Enumeration☆59Updated 8 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆24Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- ☆27Updated 2 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆35Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆50Updated 4 months ago
- A little cheatsheet for NetExec☆22Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- ☆51Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated last year
- A framework for OAuth 2.0 device code authentication grant flow phishing☆45Updated last year
- offensive security scripts and documentation☆30Updated 2 weeks ago
- ☆52Updated last year
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- ☆18Updated last year
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 2 years ago
- ☆12Updated 2 years ago