o365-attack-toolkit

Phishing simulator

A toolkit for simulating phishing attacks on Office 365 accounts

A toolkit to attack Office365

GitHub

1k stars
57 watching
216 forks
Language: Go
last commit: about 4 years ago

Related projects:

Repository Description Stars
alteredsecurity/365-stealer A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. 458
optiv/microsoft365_devicephish A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks 94
sebastian-mora/awsssome_phish A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. 31
yaxser/sharpphish This tool creates convincing phishing emails using Outlook COM objects to test an O365 module 152
n0dec/malwless A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. 271
xiecat/goblin A tool for simulating phishing attacks in red teaming exercises. 1,451
zerofox-oss/phishpond A tool for analyzing phishing kits in a contained environment 44
mandiant/reelphish A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. 509
gemgeorge/sniperphish A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. 561
uber-common/metta An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. 1,103
amv42/sshd-honeypot An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon 26
pentestgeek/phishing-frenzy A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities 804
m1nl/pompa A fully featured spear-phishing toolkit web frontend. 50
dissectmalware/officeforensictools A Python-based collection of tools for gathering forensic information from Office documents 26
nshalabi/attack-tools Utilities for simulating adversary behavior in the context of threat intelligence and security analysis 1,011