@@ -14,21 +14,21 @@ def parseArgs():
1414 formatter_class = argparse .RawDescriptionHelpFormatter ,
1515 epilog = textwrap .dedent ('''\
1616 examples:
17- graphpython --command invoke-reconasoutsider --domain company.com
18- graphpython --command invoke-userenumerationasoutsider --username <[email protected] /emails.txt> 19- graphpython --command get-graphtokens
20- graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21- graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22- graphpython --command list-recentonedrivefiles --token token
23- graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24- graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25- graphpython --command assign-privilegedrole --token token
26- graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27- graphpython --command get-manageddevices --token intune-token
28- graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29- graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30- graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31- graphpython --command reboot-device --id <deviceid> --token eyj0...
17+ Graphpython --command invoke-reconasoutsider --domain company.com
18+ Graphpython --command invoke-userenumerationasoutsider --username <[email protected] /emails.txt> 19+ Graphpython --command get-graphtokens
20+ Graphpython --command invoke-refreshtoazuremanagementtoken --tenant <tenant-id> --token refresh-token
21+ Graphpython --command get-users --token eyJ0... -- select displayname,id [--id <userid>]
22+ Graphpython --command list-recentonedrivefiles --token token
23+ Graphpython --command invoke-search --search "credentials" --entity driveItem --token token
24+ Graphpython --command invoke-customquery --query https://graph.microsoft.com/v1.0/sites/{siteId}/drives --token token
25+ Graphpython --command assign-privilegedrole --token token
26+ Graphpython --command spoof-owaemailmessage [--id <userid to spoof>] --token token --email email-body.txt
27+ Graphpython --command get-manageddevices --token intune-token
28+ Graphpython --command deploy-maliciousscript --script malicious.ps1 --token token
29+ Graphpython --command backdoor-script --id <scriptid> --script backdoored-script.ps1 --token token
30+ Graphpython --command add-exclusiongrouptopolicy --id <policyid> --token token
31+ Graphpython --command reboot-device --id <deviceid> --token eyj0...
3232 ''' )
3333 )
3434 parser .add_argument ("--command" , help = "Command to execute" )
0 commit comments