0xflagplz / Xll-Payload-GeneratorView external linksLinks
Excel Add In Payload Generator
☆14Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for Xll-Payload-Generator
Users that are interested in Xll-Payload-Generator are comparing it to the libraries listed below
Sorting:
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆22Jun 9, 2025Updated 8 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118May 2, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Shellcode loader using direct syscalls via Hell's Gate and payload encryption.☆102Jun 16, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- ☆21Jan 8, 2026Updated last month
- ☆29Sep 4, 2024Updated last year
- Origami Crypter with an updated version of the stub that bypasses windows defender.☆14Mar 13, 2025Updated 11 months ago
- ☆14Mar 19, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 10 months ago
- ☆12Jun 22, 2017Updated 8 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆12May 17, 2024Updated last year
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆14Apr 8, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆81Jan 26, 2026Updated 2 weeks ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆34Sep 15, 2022Updated 3 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- 𝐌𝐞𝐭𝐚 𝐒𝐜𝐚𝐧 is an OSINT tool for Facebook that uses the Facebook Pages Scraper API from the RAPIDAPI website, developed for use wit…☆28Sep 9, 2025Updated 5 months ago
- This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requireme…☆18Jul 16, 2024Updated last year
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 7 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 7 months ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- ☆22Dec 30, 2025Updated last month