Script-Nomad / DeeDee
Stealthy DDE Exploit Payload generator and injector for DOCX files
☆16Updated 6 years ago
Alternatives and similar repositories for DeeDee:
Users that are interested in DeeDee are comparing it to the libraries listed below
- Microsoft Applocker evasion tool☆38Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆31Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Helper script for mangling CS payloads☆52Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆20Updated 5 years ago
- C# Situational Awareness Script☆34Updated 5 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Updated 6 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- ☆25Updated 6 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆34Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 7 years ago
- Methods of C2☆21Updated 9 years ago
- ☆52Updated 5 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆18Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆13Updated 3 years ago
- ☆70Updated 6 years ago
- ☆43Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆43Updated 7 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Random source codes☆25Updated 4 years ago
- Generic malicious browser check written in C#☆13Updated 8 years ago