Execute DLL via the Excel.Application object's RegisterXLL() method
☆22Apr 17, 2021Updated 4 years ago
Alternatives and similar repositories for ExcelDllLoader
Users that are interested in ExcelDllLoader are comparing it to the libraries listed below
Sorting:
- 从入门到放弃的产物,学习过程中用python实现的一个单点c2基本功能☆11Mar 11, 2020Updated 6 years ago
- Stealthy Windows backdoor☆13Dec 2, 2020Updated 5 years ago
- Convert .bat files to .vbs☆14Aug 15, 2023Updated 2 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- Java RCE 回显测试代码☆12Jun 15, 2021Updated 4 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Detect alive host and open port .☆17Dec 7, 2022Updated 3 years ago
- This is a random process injector, and more injection techniques will be added in the future.☆13Jul 17, 2020Updated 5 years ago
- ⚙️ Map and execute EXE in memory☆12Dec 23, 2022Updated 3 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Disable PPL via custom driver and dump lsass☆15Mar 13, 2021Updated 5 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆29May 28, 2020Updated 5 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Weak password☆24Nov 7, 2017Updated 8 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 4 months ago
- Injects C# EXE or DLL Assembly into every CLR runtime and AppDomain of another process.☆237Jan 15, 2019Updated 7 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- 感染PE文件的病毒学习过程☆32Jan 14, 2021Updated 5 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Jun 28, 2025Updated 8 months ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- Persistent through COM Hijacking☆22Jan 15, 2019Updated 7 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- This is the P.O.C source for hooking the system calls on Windows 10 (1903) using it's dynamic trace feature weakness☆58Sep 12, 2019Updated 6 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- ☆24Feb 21, 2016Updated 10 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- The project uses popular anti-virus protection bypass techniques☆12Nov 26, 2018Updated 7 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago