DarkSpaceSecurity / DocExLinks
APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
☆90Updated 2 months ago
Alternatives and similar repositories for DocEx
Users that are interested in DocEx are comparing it to the libraries listed below
Sorting:
- Persist like a Dodder☆61Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- ☆71Updated last month
- ☆137Updated last month
- ☆59Updated 8 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆92Updated last month
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆147Updated 4 months ago
- ☆109Updated 3 weeks ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆98Updated this week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆96Updated last year
- Inject RDPThief into memory with PowerShell.☆64Updated 5 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- Azure Post Exploitation Framework☆200Updated 3 months ago
- ☆159Updated last month
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 7 months ago
- Addon for BHCE☆47Updated 2 months ago
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆166Updated 3 weeks ago
- Source code and examples for PassiveAggression☆61Updated last year
- ☆88Updated 5 months ago
- Stage 0☆161Updated 6 months ago
- ☆63Updated 4 months ago
- Execute commands interactively on remote Windows machines using the WinRM protocol☆155Updated last week
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆54Updated last month
- ☆72Updated last year