mrsheepsheep / idp-passthrough-phishingLinks
Abusing identity providers to do the phishing for us
☆11Updated 3 months ago
Alternatives and similar repositories for idp-passthrough-phishing
Users that are interested in idp-passthrough-phishing are comparing it to the libraries listed below
Sorting:
- Artifact monitoring that ensures fairplay☆78Updated 10 months ago
- IPSpinner works as a local proxy that redirects requests through external services.☆112Updated 9 months ago
- Linux CS bypass technique☆32Updated 10 months ago
- Check robustness of your (their) Active Directory accounts passwords☆45Updated 9 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆107Updated 3 months ago
- A Qemu Proxmox Template builder project using Packer☆65Updated 2 weeks ago
- Webshell agent in aspx and php☆28Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- Rebuild of portspoof in GO with additional features.☆24Updated last month
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 4 months ago
- Tool written in Rust to perform Password Spraying attacks against Azure/Office 365 accounts☆18Updated last year
- Bloodhound agent for Mythic☆23Updated 8 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆67Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆60Updated 4 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆83Updated this week
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 9 months ago
- Qemuno Framework☆24Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆33Updated 11 months ago
- Nemesis agent for Mythic☆28Updated last week
- ☆14Updated last year
- POC tool to abuse windows server failover clusters☆49Updated 4 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆39Updated 3 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 5 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆23Updated 8 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- ☆70Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆91Updated 4 months ago