POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.
☆35Aug 7, 2021Updated 4 years ago
Alternatives and similar repositories for phish_oauth
Users that are interested in phish_oauth are comparing it to the libraries listed below
Sorting:
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆16Jan 16, 2022Updated 4 years ago
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Really fast knock up use at own risk etc.☆18Mar 10, 2021Updated 4 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- jsc decrypt tool☆15Jul 17, 2020Updated 5 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- ☆16Dec 16, 2021Updated 4 years ago
- A .NET binary loader that bypasses AMSI☆45Sep 20, 2021Updated 4 years ago
- cobaltstrike4.5版本破解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等☆18Sep 26, 2022Updated 3 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Burp Suite DAST Power Tools☆22May 1, 2025Updated 10 months ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- ☆17May 18, 2022Updated 3 years ago
- Bloodhound Portable for Windows☆53Apr 1, 2023Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Set your VPS with docker for multiple websites☆16Jul 12, 2016Updated 9 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Build scripts for tor binary☆24Feb 23, 2026Updated 2 weeks ago
- ☆27Aug 8, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago