denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆173Updated last month
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- Python utility that generates "imageless" QR codes in various formats☆130Updated last year
- A Python POC for CRED1 over SOCKS5☆158Updated last year
- OAuth Device Code Phishing Toolkit☆91Updated last month
- Group Policy Objects manipulation and exploitation framework☆264Updated 2 weeks ago
- ☆213Updated 4 months ago
- pysnaffler☆104Updated 2 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆145Updated 3 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆161Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆117Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆197Updated last year
- Parses Snaffler output file and generate beautified outputs.☆108Updated 9 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆268Updated 3 months ago
- Azure Post Exploitation Framework☆240Updated last month
- ☆214Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆48Updated 3 months ago
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆86Updated last week
- ☆123Updated 3 months ago
- ☆162Updated 9 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆100Updated 2 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆166Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Malware As A Service☆135Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆191Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆244Updated last month
- Utilities for obfuscating shellcode☆94Updated last month
- Generate and Manage KeyCredentialLinks☆174Updated 3 weeks ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆255Updated 2 weeks ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated 2 months ago