This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆193Sep 19, 2025Updated 6 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆138Nov 17, 2025Updated 4 months ago
- OAuth Device Code Phishing Toolkit☆122Feb 6, 2026Updated 2 months ago
- SharpSuccessor is a .NET Proof of Concept (POC) for fully weaponizing Yuval Gordon’s (@YuG0rd) BadSuccessor attack from Akamai.☆396Sep 26, 2025Updated 6 months ago
- ☆290Aug 14, 2025Updated 7 months ago
- Initial Access and Post-Exploitation Tool for AAD and O365 with a browser-based GUI☆1,241Dec 31, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cobalt Strike BOF for evasive .NET assembly execution☆312Mar 31, 2025Updated last year
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 5 months ago
- BOF for Kerberos abuse (an implementation of some important features of the Rubeus).☆558Nov 23, 2025Updated 4 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆66Jan 10, 2025Updated last year
- Disconnected RSAT - A method of running Group Policy Manager, Certificate Authority and Certificate Templates MMC snap-ins from non-domai…☆300Mar 28, 2026Updated 2 weeks ago
- Azure JWT Token Manipulation Toolset☆727Dec 6, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆93Jan 8, 2025Updated last year
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last month
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reaping treasures from strings in remote processes memory☆285Feb 8, 2025Updated last year
- ☆65Mar 15, 2024Updated 2 years ago
- Ghosting-AMSI☆230Apr 24, 2025Updated 11 months ago
- Curated list of public Beacon Object Files(BOFs) build in as submodules for easy cloning☆139Dec 7, 2025Updated 4 months ago
- A fork of the great TokenTactics with support for CAE and token endpoint v2☆406Feb 9, 2026Updated 2 months ago
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆341Mar 21, 2026Updated 3 weeks ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆262Feb 21, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆18Dec 18, 2024Updated last year
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 9 months ago
- Two new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration & Fiber injection capability POC tool) Phan…☆283Sep 18, 2024Updated last year
- BOF with Synthetic Stackframe☆239Oct 30, 2025Updated 5 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 11 months ago
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- Offensive GPO dumping and analysis tool that leverages and enriches BloodHound data☆362Updated this week
- .NET assembly loader with patchless AMSI and ETW bypass☆375Apr 19, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Parses Snaffler output file and generate beautified outputs.☆138Jan 4, 2026Updated 3 months ago
- ☆160Apr 17, 2024Updated last year
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆388Jan 23, 2025Updated last year
- Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion☆103Jul 9, 2025Updated 9 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆267May 15, 2025Updated 10 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆274Jul 1, 2025Updated 9 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year