This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆191Sep 19, 2025Updated 6 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- OAuth Device Code Phishing Toolkit☆114Feb 6, 2026Updated last month
- ☆139Nov 17, 2025Updated 4 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆396Sep 26, 2025Updated 5 months ago
- ☆287Aug 14, 2025Updated 7 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,175Dec 31, 2025Updated 2 months ago
- Cobalt Strike BOF for evasive .NET assembly execution☆309Mar 31, 2025Updated 11 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆554Nov 23, 2025Updated 3 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆65Jan 10, 2025Updated last year
- Azure JWT Token Manipulation Toolset☆720Dec 6, 2024Updated last year
- Abusing Azure services over C2☆367Jan 20, 2026Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆92Jan 8, 2025Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆276Dec 27, 2024Updated last year
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- Ghosting-AMSI☆226Apr 24, 2025Updated 10 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆398Feb 9, 2026Updated last month
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆314Feb 16, 2026Updated last month
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆137Dec 7, 2025Updated 3 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆346Nov 19, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆261Feb 21, 2025Updated last year
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- BOF with Synthetic Stackframe☆233Oct 30, 2025Updated 4 months ago
- A BloodHound collector for Microsoft Configuration Manager☆393Jul 7, 2025Updated 8 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆360Jan 8, 2026Updated 2 months ago
- Parses Snaffler output file and generate beautified outputs.☆137Jan 4, 2026Updated 2 months ago
- .NET assembly loader with patchless AMSI and ETW bypass☆374Apr 19, 2023Updated 2 years ago
- ☆160Apr 17, 2024Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆385Jan 23, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 8 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆267May 15, 2025Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 8 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year