dunderhay / phishsticks
A framework for OAuth 2.0 device code authentication grant flow phishing
☆34Updated last year
Related projects ⓘ
Alternatives and complementary repositories for phishsticks
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- Microsoft365 Device Code Phishing Framework☆34Updated 3 years ago
- Discord C2 Profile for Mythic☆24Updated 7 months ago
- ☆43Updated 4 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆85Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆54Updated 4 months ago
- Living off the land searches for explorer and sharepoint☆52Updated 3 weeks ago
- fully async implementation of Dirkjan's ROADTools☆31Updated 8 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 6 months ago
- Lifetime AMSI bypass.☆36Updated 4 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 11 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 2 months ago
- ☆46Updated 2 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆39Updated 4 months ago
- ☆51Updated last year
- 🌩️ Collection of BloodHound queries for Azure☆44Updated 3 months ago
- ☆68Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- Find Inbound Email Domains☆21Updated 11 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆22Updated last year
- Federated Office365 user enumeration based on correlated response trend analysis☆47Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last month
- Automatically deploy Nemesis☆19Updated 5 months ago