Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.
☆22May 16, 2018Updated 7 years ago
Alternatives and similar repositories for MacroPhishing
Users that are interested in MacroPhishing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- ☆18Jan 8, 2026Updated 4 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆28Mar 13, 2024Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 11 months ago
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆72Mar 27, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆53Jan 28, 2026Updated 3 months ago
- A proof-of-concept malicious Chrome extension☆96Jul 19, 2022Updated 3 years ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Simple CLI utility to save off an image from every webcam hooked into a mac☆14May 20, 2021Updated 4 years ago
- ☆18Jun 25, 2024Updated last year
- C# .Net Framework program that uses RunspaceFactory for Powershell command execution.☆24Nov 9, 2022Updated 3 years ago
- Exchangelib wrapper for pentesting☆68Feb 17, 2025Updated last year
- ☆12Feb 7, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- This is a Sharp assembly loader in PowerShell☆12Oct 23, 2025Updated 6 months ago
- PHP 8 Sandbox Escape☆84Feb 28, 2026Updated 2 months ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Dec 6, 2019Updated 6 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆18Feb 29, 2024Updated 2 years ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆119Apr 22, 2026Updated 2 weeks ago
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated 2 years ago
- ☆25Jan 12, 2023Updated 3 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year