X-C3LL / xlsxPoison
Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)
☆142Updated 3 years ago
Alternatives and similar repositories for xlsxPoison:
Users that are interested in xlsxPoison are comparing it to the libraries listed below
- Bypassing AppLocker with C#☆137Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Extendable payload obfuscation and delivery framework☆141Updated 2 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 2 years ago
- ☆120Updated last year
- ☆92Updated 2 years ago
- DLL Hijack Search Order Enumeration BOF☆141Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆104Updated 2 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Checks for signature requirements over LDAP☆95Updated 2 years ago
- ☆111Updated last year
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆119Updated 2 years ago
- Koppeling x Metatwin x LazySign☆205Updated 3 years ago
- AMSI Bypass Via the Heap☆105Updated 4 years ago
- Hookers are cooler than patches.☆168Updated 3 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆87Updated 3 years ago
- Simple AV Evasion for PE Files☆41Updated 3 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆225Updated 3 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 3 years ago
- ☆67Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆141Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆140Updated 3 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 2 years ago
- Proof of concept Beacon Object File (BOF) that attempts to detect userland hooks in place by AV/EDR☆98Updated 3 years ago
- Dump stuff without touching disk☆161Updated 4 years ago
- Convert Cobalt Strike profiles to IIS web.config files☆112Updated 3 years ago
- WNF Code Execution Library Using C#☆108Updated 4 years ago