APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files
☆99Apr 2, 2025Updated last year
Alternatives and similar repositories for DocEx
Users that are interested in DocEx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆208Mar 6, 2025Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆133Mar 26, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆421Feb 7, 2026Updated 2 months ago
- Driver Reverse & Exploitation☆82Sep 4, 2025Updated 7 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 8 months ago
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆111Jul 21, 2025Updated 8 months ago
- Smart keylogging capability to steal SSH Credentials including password & Private Key☆152Mar 26, 2025Updated last year
- ☆16Aug 25, 2025Updated 7 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Covert data exfiltration via DNS☆51Feb 8, 2025Updated last year
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- ☆78Jan 1, 2026Updated 3 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆228Apr 14, 2025Updated 11 months ago
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆64Jul 29, 2025Updated 8 months ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated last year
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- Ghosting-AMSI☆230Apr 24, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆234Apr 18, 2025Updated 11 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆53May 16, 2025Updated 10 months ago
- ☆164Mar 20, 2026Updated 3 weeks ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆441Dec 9, 2025Updated 4 months ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- ☆52May 4, 2025Updated 11 months ago
- Stage 0☆168Dec 18, 2024Updated last year
- Burp Suite extension for testing Passkey systems.☆76Apr 1, 2025Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆90Dec 7, 2025Updated 4 months ago
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 9 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆215Jan 12, 2026Updated 2 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆217Oct 19, 2024Updated last year
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆120Oct 6, 2025Updated 6 months ago