o365-attack-toolkit

Phishing simulator

A toolkit for simulating phishing attacks on Office 365 accounts

A toolkit to attack Office365

GitHub

1k stars
57 watching
213 forks
Language: Go
last commit: about 4 years ago

Related projects:

Repository Description Stars
alteredsecurity/365-stealer A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. 452
optiv/microsoft365_devicephish A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks 92
sebastian-mora/awsssome_phish A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. 29
yaxser/sharpphish This tool creates convincing phishing emails using Outlook COM objects to test an O365 module 152
n0dec/malwless A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. 271
xiecat/goblin A tool for simulating phishing attacks in red teaming exercises. 1,444
zerofox-oss/phishpond A tool for analyzing phishing kits in a contained environment 43
mandiant/reelphish A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. 507
gemgeorge/sniperphish A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. 540
uber-common/metta An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. 1,101
amv42/sshd-honeypot An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon 26
pentestgeek/phishing-frenzy A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities 794
m1nl/pompa A fully featured spear-phishing toolkit web frontend. 49
dissectmalware/officeforensictools A Python-based collection of tools for gathering forensic information from Office documents 26
nshalabi/attack-tools Utilities for simulating adversary behavior in the context of threat intelligence and security analysis 1,012