denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆176Updated 2 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- A Python POC for CRED1 over SOCKS5☆161Updated last year
- pysnaffler☆106Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆94Updated 2 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆272Updated 4 months ago
- Python utility that generates "imageless" QR codes in various formats☆130Updated last year
- ☆163Updated 9 months ago
- ☆214Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆247Updated 2 months ago
- Group Policy Objects manipulation and exploitation framework☆275Updated last month
- ☆214Updated 5 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆207Updated last week
- ☆131Updated 4 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆92Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- Malware As A Service☆135Updated last year
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆150Updated 3 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆202Updated last year
- Parses Snaffler output file and generate beautified outputs.☆110Updated 9 months ago
- Hybrid AD utilities for ROADtools☆98Updated 5 months ago
- Azure Post Exploitation Framework☆241Updated 3 weeks ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆195Updated last year
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆128Updated this week
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆49Updated 4 months ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆141Updated last year
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆105Updated last week
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆162Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆174Updated 2 weeks ago
- ☆81Updated last month
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year