Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.
☆22May 16, 2018Updated 7 years ago
Alternatives and similar repositories for MacroPhishing
Users that are interested in MacroPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆18Jan 8, 2026Updated 3 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Mar 13, 2024Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 10 months ago
- dcsync bof☆51Feb 13, 2026Updated 2 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- A proof-of-concept malicious Chrome extension☆93Jul 19, 2022Updated 3 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- ☆11Feb 7, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 5 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- PHP 8 Sandbox Escape☆82Feb 28, 2026Updated last month
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- ☆25Mar 6, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆39Sep 25, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- ☆18Feb 29, 2024Updated 2 years ago
- Semantic analysis engine for detecting vulnerability fixes in Windows kernel driver patches — 58 YAML rules, Ghidra decompilation, reacha…☆59Feb 26, 2026Updated last month
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated 2 years ago