APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
☆100Apr 2, 2025Updated last year
Alternatives and similar repositories for DocEx
Users that are interested in DocEx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆133Mar 26, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆427Feb 7, 2026Updated 2 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆151Feb 10, 2025Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆112Jul 21, 2025Updated 9 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated last year
- ☆16Aug 25, 2025Updated 8 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Covert data exfiltration via DNS☆53Feb 8, 2025Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- ☆78Jan 1, 2026Updated 4 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆227Apr 14, 2025Updated last year
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 9 months ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 8 months ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- Ghosting-AMSI☆235Apr 24, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆236Apr 18, 2025Updated last year
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 11 months ago
- ☆164Mar 20, 2026Updated last month
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆445Apr 11, 2026Updated 2 weeks ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆52May 4, 2025Updated 11 months ago
- Stage 0☆169Dec 18, 2024Updated last year
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆89Dec 7, 2025Updated 4 months ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 9 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆216Apr 17, 2026Updated 2 weeks ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago
- A security assessment tool for analyzing Active Directory Group Policy Objects (GPOs) to identify misconfigurations and vulnerabilities☆324Mar 27, 2025Updated last year