8000 Update v1.0 · wisdark/Graphpython@5ba8f53 · GitHub
[go: up one dir, main page]

Skip to content

Commit 5ba8f53

Browse files
committed
Update v1.0
1 parent 0c51e8f commit 5ba8f53

File tree

1 file changed

+15
-15
lines changed

1 file changed

+15
-15
lines changed

Graphpython/__main__.py

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,21 +14,21 @@ def parseArgs():
1414
formatter_class=argparse.RawDescriptionHelpFormatter,
1515
epilog=textwrap.dedent('''\
1616
examples:
17-
graphpython --command invoke-reconasoutsider --domain company.com
18-
graphpython --command invoke-userenumerationasoutsider --username <email@company.com/emails.txt>
19-
graphpython --command get-graphtokens
20-
graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21-
graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22-
graphpython --command list-recentonedrivefiles --token token
23-
graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24-
graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25-
graphpython --command assign-privilegedrole --token token
26-
graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27-
graphpython --command get-manageddevices --token intune-token
28-
graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29-
graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30-
graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31-
graphpython --command reboot-device --id <deviceid> --token eyj0...
17+
Graphpython --command invoke-reconasoutsider --domain company.com
18+
Graphpython --command invoke-userenumerationasoutsider --username <email@company.com/emails.txt>
19+
Graphpython --command get-graphtokens
20+
Graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21+
Graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22+
Graphpython --command list-recentonedrivefiles --token token
23+
Graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24+
Graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25+
Graphpython --command assign-privilegedrole --token token
26+
Graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27+
Graphpython --command get-manageddevices --token intune-token
28+
Graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29+
Graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30+
Graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31+
Graphpython --command reboot-device --id <deviceid> --token eyj0...
3232
''')
3333
)
3434
parser.add_argument("--command", help="Command to execute")

0 commit comments

Comments
 (0)
0