denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆182Updated 4 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- pysnaffler☆109Updated 2 weeks ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆206Updated last year
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- ☆160Updated 11 months ago
- Python utility that generates "imageless" QR codes in various formats☆134Updated last year
- OAuth Device Code Phishing Toolkit☆107Updated 4 months ago
- Group Policy Objects manipulation and exploitation framework☆284Updated last month
- ☆229Updated 7 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- Parses Snaffler output file and generate beautified outputs.☆130Updated 2 weeks ago
- Weaponizing DCOM for NTLM Authentication Coercions☆275Updated 6 months ago
- ☆215Updated last year
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆259Updated 2 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆139Updated 5 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆183Updated last year
- Hybrid AD utilities for ROADtools☆105Updated 7 months ago
- ☆186Updated last month
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆131Updated 5 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆167Updated last year
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆50Updated 6 months ago
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆156Updated 2 weeks ago
- The DCERPC only printerbug.py version☆194Updated 2 months ago
- BloodHound PowerShell client☆75Updated last month
- Azure Post Exploitation Framework☆244Updated 2 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆250Updated last month
- Living off the land searches for explorer and sharepoint☆92Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- ☆154Updated 9 months ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆97Updated last year
- ☆96Updated last month