@@ -14,21 +14,21 @@ def parseArgs():
14
14
formatter_class = argparse .RawDescriptionHelpFormatter ,
15
15
epilog = textwrap .dedent ('''\
16
16
examples:
17
- graphpython --command invoke-reconasoutsider --domain company.com
18
- graphpython --command invoke-userenumerationasoutsider --username <email@company.com/emails.txt>
19
- graphpython --command get-graphtokens
20
- graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21
- graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22
- graphpython --command list-recentonedrivefiles --token token
23
- graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24
- graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25
- graphpython --command assign-privilegedrole --token token
26
- graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27
- graphpython --command get-manageddevices --token intune-token
28
- graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29
- graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30
- graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31
- graphpython --command reboot-device --id <deviceid> --token eyj0...
17
+ Graphpython --command invoke-reconasoutsider --domain company.com
18
+ Graphpython --command invoke-userenumerationasoutsider --username <email@company.com/emails.txt>
19
+ Graphpython --command get-graphtokens
20
+ Graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21
+ Graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22
+ Graphpython --command list-recentonedrivefiles --token token
23
+ Graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24
+ Graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25
+ Graphpython --command assign-privilegedrole --token token
26
+ Graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27
+ Graphpython --command get-manageddevices --token intune-token
28
+ Graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29
+ Graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30
+ Graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31
+ Graphpython --command reboot-device --id <deviceid> --token eyj0...
32
32
''' )
33
33
)
34
34
parser .add_argument ("--command" , help = "Command to execute" )
0 commit comments