TheKevinWang / MacroPhishingLinks
Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.
☆21Updated 7 years ago
Alternatives and similar repositories for MacroPhishing
Users that are interested in MacroPhishing are comparing it to the libraries listed below
Sorting:
- A BOF tool that can be used to collect passwords using CredUIPromptForWindowsCredentialsName.☆15Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆34Updated 2 years ago
- A script that greps composite key-like strings from a KeePassXC process dump, then uses a customized version of pykeepass library to unlo…☆32Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Updated 5 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆40Updated 4 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- ☆18Updated 2 weeks ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Find Inbound Email Domains☆24Updated last year
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- ☆18Updated 4 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆31Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated last year
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆25Updated 3 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 3 years ago
- Library of sites for categorization☆26Updated 6 years ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆56Updated 3 years ago
- ☆71Updated last week
- ☆15Updated last year
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Updated 3 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆42Updated 7 months ago
- ☆25Updated 3 years ago