froyo75 / catFish0365Links
A simple program to automate Microsoft OAuth device code phishing attacks.
☆19Updated last year
Alternatives and similar repositories for catFish0365
Users that are interested in catFish0365 are comparing it to the libraries listed below
Sorting:
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆93Updated last month
- A cross platform Go library to work with Windows Security Descriptors☆39Updated 5 months ago
- Active Directory Authentication Library☆86Updated 2 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆93Updated 2 years ago
- Find interesting files stored on (System Center) Configuration Manager (SCCM/CM) SMB shares☆190Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆162Updated last year
- A tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks☆182Updated 4 months ago
- Some scripts to support with importing large datasets into BloodHound☆81Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆92Updated last month
- pysnaffler☆109Updated this week
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Updated last year
- using graph proxy to monitor teams user presence☆55Updated last year
- ☆94Updated last month
- C# implementation of TokenFinder. Steal M365 access tokens from Office Desktop apps☆144Updated last year
- Abuse Azure API permissions for red teaming☆69Updated 2 years ago
- ACL abuse swiss-knife☆125Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆180Updated 3 months ago
- Get Fine Grained Password Policy☆77Updated 8 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Small utility to chunk up a large BloodHound JSON file into smaller files for importing.☆97Updated 2 years ago
- ☆79Updated 11 months ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆275Updated this week
- ☆163Updated last year
- Python utility that generates "imageless" QR codes in various formats☆133Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Updated 11 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆134Updated 11 months ago
- Static standalone binaries for Linux and Windows (x64) of Python offensive tools. Compiled using PyInstaller, Docker for Windows, WSL2, a…☆111Updated 3 years ago
- Tool to extract username and password of current user from PanGPA in plaintext☆88Updated last year