aut0m8r / FunWithMacrosLinks
Companion content for my 'Fun with Office Macros' webcast.
☆23Updated last year
Alternatives and similar repositories for FunWithMacros
Users that are interested in FunWithMacros are comparing it to the libraries listed below
Sorting:
- Retired TrustedSec Capabilities☆248Updated 11 months ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆66Updated 2 weeks ago
- ☆179Updated 11 months ago
- ☆173Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆157Updated 11 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆200Updated last year
- Completely Risky Active-Directory Simulation Hub☆103Updated last year
- Parses Snaffler output file and generate beautified outputs.☆109Updated 9 months ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆115Updated last year
- ☆196Updated 4 months ago
- User Enumeration of Microsoft Teams users via API☆177Updated last year
- ☆123Updated 4 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆147Updated 3 months ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆108Updated 2 years ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆298Updated 2 months ago
- TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and …☆327Updated 9 months ago
- Automatically run and populate a new instance of BH CE☆107Updated this week
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆113Updated 2 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆45Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆220Updated 7 months ago
- ☆264Updated 2 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆53Updated 6 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆191Updated 8 months ago
- A cross-platform tool to find and decrypt Group Policy Preferences passwords from the SYSVOL share using low-privileged domain accounts☆164Updated 4 months ago
- Azure Post Exploitation Framework☆240Updated last week
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆100Updated last week
- List of tools and resources for pentesting Microsoft Active Directory☆102Updated 4 months ago
- ☆153Updated 7 months ago
- ☆163Updated 4 months ago