denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆152Updated 2 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- ☆201Updated last month
- A Python POC for CRED1 over SOCKS5☆151Updated 9 months ago
- Python utility that generates "imageless" QR codes in various formats☆124Updated 11 months ago
- ☆151Updated 5 months ago
- Azure Post Exploitation Framework☆201Updated 4 months ago
- pysnaffler☆100Updated 4 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆258Updated 2 weeks ago
- Parses Snaffler output file and generate beautified outputs.☆105Updated 5 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆189Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆89Updated 2 months ago
- ☆206Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- Malware As A Service☆134Updated last year
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆177Updated 10 months ago
- ☆63Updated last month
- Weaponizing DCOM for NTLM Authentication Coercions☆154Updated 2 weeks ago
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆227Updated last month
- ☆146Updated 3 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆156Updated last year
- Generate and Manage KeyCredentialLinks☆160Updated last week
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated 11 months ago
- OAuth Device Code Phishing Toolkit☆63Updated 2 months ago
- ☆99Updated last week
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆175Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆246Updated 6 months ago
- Proof of concept: using a Cloudflare worker for AITM attacks☆128Updated 5 months ago
- Hybrid AD utilities for ROADtools☆82Updated last month
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆76Updated this week
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆175Updated 2 years ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆125Updated this week