DarkSpaceSecurity / DocExLinks
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
☆91Updated 3 months ago
Alternatives and similar repositories for DocEx
Users that are interested in DocEx are comparing it to the libraries listed below
Sorting:
- Persist like a Dodder☆62Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 4 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆140Updated 3 weeks ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆83Updated 5 months ago
- Vast.ai Password Kracking☆74Updated 3 weeks ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆95Updated last week
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆96Updated last year
- Convert your shellcode into an ASCII string☆94Updated 2 weeks ago
- Deploy a phishing infrastructure on the fly.☆71Updated 6 months ago
- ☆76Updated last year
- ☆163Updated 2 months ago
- A Moodle Scanner☆42Updated 7 months ago
- Addon for BHCE☆47Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆87Updated last month
- Utilizng an MCP Server to communicate with your C2☆75Updated 2 months ago
- ☆59Updated 9 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆85Updated 3 months ago
- ☆73Updated 2 months ago
- ☆24Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 4 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆55Updated 2 months ago
- EvilGinx Modify / Custom PHISHLETs / JS☆40Updated this week
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 7 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- C2 writen in Rust & Go powered by Tor network.☆106Updated last week
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- Source code and examples for PassiveAggression☆61Updated last year
- ☆57Updated 8 months ago