Script-Nomad / DeeDee
Stealthy DDE Exploit Payload generator and injector for DOCX files
☆16Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for DeeDee
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆25Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- Microsoft Applocker evasion tool☆38Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆24Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆16Updated last year
- Methods of C2☆21Updated 9 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Random stuff☆16Updated 6 years ago
- Simple C2 over the Trello API☆37Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 3 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 7 months ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- ☆16Updated 3 years ago