Fully functioning reverse shell written entirely in VBA.
☆126Jun 5, 2023Updated 2 years ago
Alternatives and similar repositories for VBA-Macro-Reverse-Shell
Users that are interested in VBA-Macro-Reverse-Shell are comparing it to the libraries listed below
Sorting:
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- This repository is a collection of my malicious VBA projects.☆119Feb 13, 2021Updated 5 years ago
- Injects shellcode into remote processes using direct syscalls☆77Dec 30, 2020Updated 5 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- Remove API hooks from a Beacon process.☆282Sep 18, 2021Updated 4 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,235Dec 27, 2023Updated 2 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆160Feb 25, 2023Updated 3 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,300Aug 15, 2024Updated last year
- Collection of beacon BOF written to learn windows and cobaltstrike☆362Feb 24, 2023Updated 3 years ago
- ☆133Dec 19, 2020Updated 5 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- A collection of Cobalt Strike Malleable C2 profiles☆36Oct 13, 2020Updated 5 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ADExplorerSnapshot.py is an AD Explorer snapshot parser. It is made as an ingestor for BloodHound via BOFHound, and also supports full-ob…☆1,063Jan 22, 2026Updated 2 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Tier0 (Tier Zero) Account discovery for ActiveDirectory Security☆17Apr 11, 2018Updated 7 years ago
- Injects HTML/PHP/ASP to the PE☆105Jul 23, 2020Updated 5 years ago
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆230Oct 6, 2024Updated last year
- D/Invoke implementation in Nim☆100Jun 8, 2022Updated 3 years ago
- Process Injection☆768Oct 24, 2021Updated 4 years ago
- New UAC bypass for Silent Cleanup for CobaltStrike☆191Jul 14, 2021Updated 4 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Code Exec via Excel☆89Jul 31, 2017Updated 8 years ago
- ☆361Apr 24, 2021Updated 4 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Inject .NET assemblies into an existing process☆507Jan 19, 2022Updated 4 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- ☆16Dec 16, 2015Updated 10 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆381Apr 28, 2020Updated 5 years ago
- Collection of VBA macro published in our twitter / blog☆157Sep 5, 2022Updated 3 years ago
- WhoAmI by asking the LDAP service on a domain controller.☆65Feb 8, 2022Updated 4 years ago
- A curated list of ressources for Volatility 2 & 3☆13Mar 17, 2024Updated 2 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆53May 21, 2020Updated 5 years ago