OAuth Device Code Phishing Toolkit
☆115Feb 6, 2026Updated last month
Alternatives and similar repositories for squarephish2
Users that are interested in squarephish2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow when the victim …☆191Sep 19, 2025Updated 6 months ago
- AzDevRecon is a powerful web-based enumeration tool for offensive security professionals, red teamers, and pentesters targeting Azure Dev…☆26Oct 13, 2025Updated 5 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 9 months ago
- Vectored Exception Handling Squared☆31Dec 27, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Weaponizing DCOM for NTLM Authentication Coercions☆201Nov 4, 2025Updated 4 months ago
- Shellcode loader that executes embedded Lua from Rust.☆127Dec 16, 2024Updated last year
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆197Feb 16, 2026Updated last month
- Python script to leverage MSFT_MTProcess WMI class☆40Sep 17, 2025Updated 6 months ago
- TokenCert☆102Nov 15, 2024Updated last year
- ☆164May 5, 2025Updated 10 months ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆166Dec 7, 2024Updated last year
- ☆76Jan 1, 2026Updated 2 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Persist like a Dodder☆68May 19, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Another version of .NET loader provides capabilities of bypassing ETW and AMSI, utilizing VEH for syscalls and loading .NET assemblies☆50Jul 6, 2025Updated 8 months ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- Fairy Law - Compromise or disable EDR security solutions☆68Dec 1, 2025Updated 3 months ago
- An App Domain Manager Injection DLL PoC on steroids☆212Dec 14, 2023Updated 2 years ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Utilizng an MCP Server to communicate with your C2☆88May 15, 2025Updated 10 months ago
- BOF to steal browser cookies & credentials☆509Mar 4, 2026Updated 3 weeks ago
- ☆49Apr 9, 2025Updated 11 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- ☆121Nov 21, 2024Updated last year
- Golang Automation Framework for Cobalt Strike using the Rest API☆57Dec 4, 2025Updated 3 months ago
- A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike☆195Oct 29, 2025Updated 4 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆93Mar 12, 2026Updated 2 weeks ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago