Skip to content

Commit 1e6c09e

Browse files
authored
Enhance README with phishing script details
Added descriptions for phishing simulation scripts in README.
1 parent 86b349a commit 1e6c09e

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

README.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,11 @@ PowerShell-Scripts/
2828
Profile-App.ps1
2929
Audit-AppDelegationRisks.ps1
3030
│ └── Audit-AllUsersRolePerms.ps1
31+
│ └── ** automate creation of malicious-looking OAuth authorization flows (device‑code and consent URLs) used in consent‑phishing simulations **
32+
│ generate_oauth_phishing_url_pwnd2.ps1
33+
│ generate_oauth_phishing_url_MS_App2.ps1
34+
│ generate_oauth_phishing_url2.ps1
35+
3136
## ── 📂 ├── On-Prem Active Directory/
3237
│ └── ad_object_permissions3.ps1 (uses ActiveDirectory module (ADWS))
3338
│ └── delegated_rights.ps1 (uses ActiveDirectory module (ADWS))
@@ -220,6 +225,21 @@ Must have Graph API permissions Policy.Read.All to use this script
220225
Use like so:
221226
`.\Audit-AllUsersRolePerms.ps1`
222227

228+
---
229+
### `generate_oauth_phishing_url_pwnd2.ps1`
230+
231+
Produces preconfigured phishing payloads and tracking for “pwnd” style scenarios where the script automates the device‑code flow lifecycle (create code, deliver to victim, poll for token).
232+
233+
---
234+
### `generate_oauth_phishing_url_MS_App2.ps1`
235+
236+
Builds phishing URLs that impersonate or reuse Microsoft‑branded client IDs and scopes to make the consent prompt appear legitimate.
237+
238+
---
239+
### `generate_oauth_phishing_url2.ps1`
240+
241+
Generates OAuth device‑code or authorization URLs and associated tracking artifacts that an attacker could deliver to a target to induce them to approve an OAuth consent prompt.
242+
223243
## ── 📂 Section: On-Prem Active Directory ──
224244
---
225245
### `ad_object_permissions3.ps1`

0 commit comments

Comments
 (0)