VBA Reversed TCP Meterpreter Stager
☆65Apr 23, 2018Updated 7 years ago
Alternatives and similar repositories for MacroMeter
Users that are interested in MacroMeter are comparing it to the libraries listed below
Sorting:
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 8 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- ☆65May 26, 2016Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Jun 10, 2016Updated 9 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆231Nov 17, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆168Jun 8, 2017Updated 8 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Jun 30, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- ☆50Sep 25, 2017Updated 8 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Office for Mac Macro Payload Generator☆244Sep 25, 2025Updated 5 months ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆408Jul 14, 2016Updated 9 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆230May 30, 2019Updated 6 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29May 5, 2018Updated 7 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆686Oct 27, 2016Updated 9 years ago