aO365-Attack-Toolkit – A Toolkit To Attack Office365
Some of the implemented features are :
- Extraction of keyworded e-mails from Outlook.
- Creation of Outlook Rules.mplemented features are :Extraction of keyworded e-mails from Outlook.
- Extraction of files from OneDrive/Sharepoint.
- Injection of macros on Word documents.
The toolkit also consists of several components
The phishing endpoint is responsible for serving the HTML file that also performs the OAuth token phishing.
Afterward, the token will be used by the backend services to perform the defined attacks.
The management interface can also be utilized to inspect the extracted information from the Microsoft Graph API.