mrsheepsheep / idp-passthrough-phishingLinks
Abusing identity providers to do the phishing for us
☆11Updated 3 months ago
Alternatives and similar repositories for idp-passthrough-phishing
Users that are interested in idp-passthrough-phishing are comparing it to the libraries listed below
Sorting:
- Rebuild of portspoof in GO with additional features.☆19Updated last week
- Webshell agent in aspx and php☆24Updated 3 months ago
- Artifact monitoring that ensures fairplay☆78Updated 7 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- IPSpinner works as a local proxy that redirects requests through external services.☆74Updated 5 months ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 6 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 11 months ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆17Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆127Updated last month
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 5 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆77Updated 10 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆66Updated this week
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆42Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- ☆80Updated last month
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆75Updated 10 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆66Updated last month
- Tools for attacking Azure Function Apps☆83Updated 10 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆33Updated 6 months ago
- ☆46Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆66Updated 11 months ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆68Updated 2 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆22Updated 4 months ago
- fully async implementation of Dirkjan's ROADTools☆32Updated 5 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆29Updated last month
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆56Updated 2 weeks ago