Mr-Cyb3rgh0st / Excel-Exploit
MacroExploit use in excel sheet
☆20Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Excel-Exploit
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- ☆20Updated last year
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- ☆28Updated last year
- Cobalt Strike BOFS☆16Updated 11 months ago
- ☆15Updated 8 months ago
- ☆25Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆32Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆14Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 7 months ago
- Red Team Server (RTS)☆16Updated 8 months ago
- My journey and notes on learning Offensive Security from the ground up☆16Updated 8 months ago
- ShootCutMe an .LNK file creator tool for redteamer☆14Updated last month
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated 10 months ago
- ☆50Updated 7 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆18Updated 9 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆23Updated 4 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Updated last year
- Proof of Concept for CVE-2023-23397 in Python☆27Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 8 months ago
- ☆21Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 3 months ago
- Analyzes AdminSDHolder permissions & compares with a previous run, to detect potential backdoor/excessive persistent permission(s)☆14Updated 11 months ago
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- ☆46Updated last year