dunderhay / phishsticksView external linksLinks
A framework for OAuth 2.0 device code authentication grant flow phishing
☆46May 31, 2023Updated 2 years ago
Alternatives and similar repositories for phishsticks
Users that are interested in phishsticks are comparing it to the libraries listed below
Sorting:
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Self delete DLL (2)☆14Feb 15, 2024Updated 2 years ago
- Windows Protected Process Light toggle tool — dynamically finds offsets and patches EPROCESS using RTCore64☆66May 2, 2025Updated 9 months ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148May 23, 2024Updated last year
- ☆38Apr 15, 2025Updated 10 months ago
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Feb 10, 2023Updated 3 years ago
- Modified version of PEAS client for offensive operations☆16Mar 8, 2021Updated 4 years ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆41Jan 6, 2026Updated last month
- ☆26Feb 11, 2025Updated last year
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Nov 24, 2021Updated 4 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Serverless Redirector in various cloud vendor for red team☆73Dec 8, 2022Updated 3 years ago
- This project is created for research into antivirus evasion by unhooking.☆18Sep 2, 2021Updated 4 years ago
- ☆143Oct 31, 2023Updated 2 years ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆66Dec 29, 2023Updated 2 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆154Jun 28, 2024Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆67Feb 26, 2025Updated 11 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆119Dec 23, 2025Updated last month
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Local SYSTEM auth trigger for relaying☆168Jul 22, 2025Updated 6 months ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- Enumerate and check domains for Azure tenants☆60Feb 1, 2022Updated 4 years ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 3 weeks ago
- PICO-Implant is a Proof of Concept C2 implant built using Position-independent Code Objects (PICO) for modular functionality. This projec…☆43Nov 9, 2025Updated 3 months ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- CallBack-Techniques for Shellcode execution ported to Nim☆62Mar 19, 2021Updated 4 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago