dunderhay / phishsticks
A framework for OAuth 2.0 device code authentication grant flow phishing
☆44Updated last year
Alternatives and similar repositories for phishsticks:
Users that are interested in phishsticks are comparing it to the libraries listed below
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- Automatically create an operation log of your shell! Supports Linux (Bash/Zsh) and Windows (PowerShell/CMD).☆28Updated 2 weeks ago
- ☆43Updated 8 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆46Updated 2 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 6 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- Impacket pre-compiled binaries☆15Updated last year
- Lifetime AMSI bypass.☆35Updated 8 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12Updated 10 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- ☆26Updated last year
- Scripts to interact with Microsoft Graph APIs☆36Updated 4 months ago
- Find Inbound Email Domains☆22Updated last year
- A repo of scripts I find helpful for daily tasks.☆28Updated 10 months ago
- ☆18Updated 4 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆41Updated 11 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆37Updated last week
- Living Off the Foreign Land setup scripts☆65Updated 3 weeks ago
- ☆71Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago