JohnWoodman / VBA-Macro-ProjectsLinks
This repository is a collection of my malicious VBA projects.
☆119Updated 4 years ago
Alternatives and similar repositories for VBA-Macro-Projects
Users that are interested in VBA-Macro-Projects are comparing it to the libraries listed below
Sorting:
- ☆133Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆159Updated 3 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆142Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Start new PowerShell without etw and amsi in pure nim☆156Updated 3 years ago
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆131Updated 4 years ago
- Remotely enables Restricted Admin Mode☆215Updated 4 years ago
- ☆97Updated 3 years ago
- C# tool for installing a shared network printer abusing the PrinterNightmare bug to allow other network machines easy privesc!☆185Updated 4 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Password Spraying Framework☆63Updated 3 years ago
- This is a monorepo including codes from grey hat c# by no starch and some of my own research with it.☆60Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Updated 4 years ago
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- Bypassing AppLocker with C#☆143Updated 4 years ago
- My doodles as I learn C#☆74Updated 5 years ago
- ☆48Updated 5 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- Code Exec via Excel☆88Updated 8 years ago
- Simple APPLocker bypass summary☆47Updated 7 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆123Updated 4 years ago
- Tool to discover Resource-Based Constrained Delegation attack paths in Active Directory environments☆126Updated 4 years ago
- ☆120Updated 3 years ago
- ☆142Updated 2 years ago
- D/Invoke port of UrbanBishop☆108Updated 5 years ago
- Dump stuff without touching disk☆164Updated 5 years ago
- ☆209Updated 3 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 8 months ago
- Source for tasks I have used with Covenant☆120Updated 4 years ago