denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆184Updated 4 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- A Python POC for CRED1 over SOCKS5☆164Updated last year
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- pysnaffler☆110Updated last month
- OAuth Device Code Phishing Toolkit☆109Updated this week
- Python utility that generates "imageless" QR codes in various formats☆136Updated last year
- Group Policy Objects manipulation and exploitation framework☆288Updated 2 months ago
- ☆160Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆259Updated 2 months ago
- Azure Post Exploitation Framework☆244Updated 3 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆169Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Updated 7 months ago
- Malware As A Service☆137Updated last year
- Parses Snaffler output file and generate beautified outputs.☆132Updated last month
- ☆188Updated last month
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- Hybrid AD utilities for ROADtools☆106Updated 8 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆160Updated 2 weeks ago
- ☆230Updated 7 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆232Updated last year
- ☆216Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Updated last year
- The DCERPC only printerbug.py version☆200Updated 3 months ago
- ☆154Updated 10 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- ☆120Updated 10 months ago
- BloodHound PowerShell client☆76Updated last month
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆108Updated 3 weeks ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Updated 5 months ago