o365-attack-toolkit
Phishing simulator
A toolkit for simulating phishing attacks on Office 365 accounts
A toolkit to attack Office365
1k stars
57 watching
213 forks
Language: Go
last commit: about 4 years ago Related projects:
Repository | Description | Stars |
---|---|---|
alteredsecurity/365-stealer | A phishing simulation tool that automates illicit consent grant attacks on Azure AD using Python3 and PHP. | 452 |
optiv/microsoft365_devicephish | A tool designed to demonstrate a vulnerability in Microsoft's OAuth Authorization Flow for phishing attacks | 92 |
sebastian-mora/awsssome_phish | A tool for simulating phishing attacks on AWS SSO using a serverless architecture and automated deployment. | 29 |
yaxser/sharpphish | This tool creates convincing phishing emails using Outlook COM objects to test an O365 module | 152 |
n0dec/malwless | A tool designed to simulate system compromise or attack behaviors without running processes or PoCs. | 271 |
xiecat/goblin | A tool for simulating phishing attacks in red teaming exercises. | 1,444 |
zerofox-oss/phishpond | A tool for analyzing phishing kits in a contained environment | 43 |
mandiant/reelphish | A tool designed to test the effectiveness of phishing defenses by simulating real-time two-factor phishing attacks. | 507 |
gemgeorge/sniperphish | A web-based phishing toolkit designed to simulate real-world attacks for security testing and awareness training. | 540 |
uber-common/metta | An adversarial simulation tool to test information security preparedness by simulating network-based attacks on various systems. | 1,101 |
amv42/sshd-honeypot | An intrusion detection system designed to capture and analyze ssh interactions between an attacker and a modified OpenSSH deamon | 26 |
pentestgeek/phishing-frenzy | A Ruby on Rails tool used to simulate phishing attacks and test email security vulnerabilities | 794 |
m1nl/pompa | A fully featured spear-phishing toolkit web frontend. | 49 |
dissectmalware/officeforensictools | A Python-based collection of tools for gathering forensic information from Office documents | 26 |
nshalabi/attack-tools | Utilities for simulating adversary behavior in the context of threat intelligence and security analysis | 1,012 |