• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Phyton 365-Stealer - 365-Stealer is a phishing simualtion tool written in python3

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,623
Solutions
2
Reputation
32
Reaction score
100,456
Points
2,313
Credits
32,750
‎6 Years of Service‎
 
76%
screenshot-3082.png


About

365-Stealer is a tool written in Python3 which can be used in illicit consent grant attacks. When the victim grant his consent we get their Refresh Token which can be used to request multiple Tokens that can help us in accessing data like Mails, Notes, Files from OneDrive etc. Doing this manually will take a lot of time so this tool helps in automating the process.

365-Stealer comes with 2 interfaces:

    CLI - The CLI is purely written in python3.
    Web UI - The Web UI is written in PHP and it also leverages python3 for executing commands in background.

Features

    Steals Refresh Token which can be used to grant new Access Tokens for at least 90 days.
    Can send mails with attachments from the victim user to another user.
    Creates Outlook Rules like forwarding any mail that the victim receives.
    Upload any file in victims OneDrive.
    Steal's files from OneDrive, OneNote and dump all the Mails including the attachments.
    365-Stealer Management portal allows us to manage all the data of the victims.
    Can backdoor .docx file located in OneDrive by injecting macros and replace the file extension with .doc.
    All the data like Refresh Token, Mails, Files, Attachments, list of all the users in the victim's tenant and our Configuration are stored in database.
    Delay the request by specifying time in seconds while stealing the data
    Tool also helps in hosting the dummy application for performing illicit consent grant attack by using --run-app in the terminal or by using 365-Stealer Management.
    By using --no-stealing flag 365-Stealer will only steal token's that can be leverage to steal data.
    We can also request New Access Tokens for all the user’s or for specific user.
    We can easily get a new access token using --refresh-token, --client-id, --client-secret flag.
    Configuration can be done from 365-Stealer CLI or Management portal.
    The 365-Stealer CLI gives an option to use it in our own way and set up our own Phishing pages.
    Allow us to steal particular data eg, OneDrive, Outlook etc. by passing a --custom-steal flag.
    All the stolen data are saved in database.db file which we can share with our team to leverage the existing data, tokens etc.
    We can search emails with specific keyword, subject, user's email address or by filtering the emails containing attachments from the 365-Stealer Management portal.
    We can dump the user info from the target tenant and export the same to CSV.

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top