power-pwn
power-pwn copied to clipboard
An offensive and defensive security toolset for Microsoft 365 Power Platform
Set up an operation to replace victim machine connection reference so payloads can be sent to different machines
Prereqs: msft tenant available. Script to replace manual set up specified here https://github.com/mbrg/power-pwn/blob/main/docs/cloud_setup.md
```cmd C:\...\Python\Python39\python39.exe C:/.../power-pwn/src/powerpwn/main.py recon --gui -t Traceback (most recent call last): File "C:\...\power-pwn\src\powerpwn\main.py", line 7, in from powerpwn.cli.runners import ( File "C:\...\power-pwn\src\powerpwn\cli\runners.py", line 9, in from powerpwn.nocodemalware.malware_runner import MalwareRunner File...
Running `powerpwn recon` I'm able to fetch info from a bunch of environments. When going thru one particular environment I get this error: ``` 2023-09-07 16:05:28 | powerpwn | INFO...
**Background** 1. _powerpwn_ could have better CLI capabilities, to better interact with users and guide them (similarly to other attack tools). 2. Some of the content should be based upon...
**Background** 1. powerpwn has several known error handling use cases which should be addressed for smoother user experience and fuller functionality. **Def done** 1. Map these cases 2. Update the...
- [ ] General docs - [ ] powerdump - [ ] powerdoor - [ ] phisihing - [ ] no-code malware
1) explore which connectors are shareable (so guest users will have access to these connections) 2) add recon for supported connectors 3) add dump for supported connectors