You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Purpose:** Enumerates every registered application and service principal in an Entra ID tenant.
@@ -226,6 +228,8 @@ Use like so:
226
228
`.\Audit-AllUsersRolePerms.ps1`
227
229
228
230
---
231
+
👉** automate creation of malicious-looking OAuth authorization flows (device‑code and consent URLs) used in consent‑phishing simulations **
232
+
229
233
### `generate_oauth_phishing_url_pwnd2.ps1`
230
234
231
235
Produces preconfigured phishing payloads and tracking for “pwnd” style scenarios where the script automates the device‑code flow lifecycle (create code, deliver to victim, poll for token).
@@ -240,6 +244,17 @@ Builds phishing URLs that impersonate or reuse Microsoft‑branded client IDs an
240
244
241
245
Generates OAuth device‑code or authorization URLs and associated tracking artifacts that an attacker could deliver to a target to induce them to approve an OAuth consent prompt.
0 commit comments