MacroExploit use in excel sheet
☆20Jun 12, 2023Updated 2 years ago
Alternatives and similar repositories for Excel-Exploit
Users that are interested in Excel-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A C2 framework built for my bachelors thesis☆57Jan 14, 2026Updated 2 months ago
- C++ Code to perform a MiniDump of lsass.exe☆36Aug 2, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- ☆17Jun 28, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- A dynamic unpacking tool☆149Sep 17, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 3 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated 2 months ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- CVE-2023-34960 Chamilo PoC☆34Jun 9, 2023Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 2 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆138Apr 13, 2023Updated 2 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- ☆35Nov 16, 2023Updated 2 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Windows Access token manipulation tool made in C#☆24Aug 24, 2025Updated 7 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- ☆46Jun 21, 2023Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago