denniskniep / DeviceCodePhishingLinks
This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim opens the phishing link and instantly redirects them to the authentication page. No authentication method, not even FIDO, is able to protect against this type of attack.
☆169Updated 4 months ago
Alternatives and similar repositories for DeviceCodePhishing
Users that are interested in DeviceCodePhishing are comparing it to the libraries listed below
Sorting:
- ☆206Updated 2 months ago
- A Python POC for CRED1 over SOCKS5☆154Updated 10 months ago
- Python utility that generates "imageless" QR codes in various formats☆125Updated last year
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆208Updated last week
- pysnaffler☆102Updated last week
- Group Policy Objects manipulation and exploitation framework☆215Updated last week
- ☆158Updated 7 months ago
- Weaponizing DCOM for NTLM Authentication Coercions☆264Updated last month
- SCCMSecrets.py aims at exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement.☆240Updated 3 months ago
- OAuth Device Code Phishing Toolkit☆84Updated 4 months ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) shares via HTTP(s)☆190Updated 10 months ago
- A PowerShell script to perform PKINIT authentication with the Windows API from a non domain-joined machine.☆158Updated last year
- ☆68Updated 3 weeks ago
- ☆212Updated last year
- Azure Post Exploitation Framework☆204Updated 6 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆116Updated last year
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆112Updated 2 weeks ago
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆140Updated last year
- Living off the land searches for explorer and sharepoint☆90Updated 4 months ago
- Generate and Manage KeyCredentialLinks☆162Updated 2 weeks ago
- Malware As A Service☆135Updated last year
- Parses Snaffler output file and generate beautified outputs.☆106Updated 7 months ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆179Updated last year
- Automating the MITM attack on WSUS☆262Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 8 months ago
- ☆112Updated last month
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆185Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆139Updated 5 months ago
- Hybrid AD utilities for ROADtools☆86Updated 3 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year