bhdresh / CVE-2017-0199Links
Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
☆729Updated 8 years ago
Alternatives and similar repositories for CVE-2017-0199
Users that are interested in CVE-2017-0199 are comparing it to the libraries listed below
Sorting:
- ☆736Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆528Updated 5 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,112Updated 8 years ago
- Micro$oft Windows Hacking Pack☆524Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 6 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆688Updated 9 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆446Updated 2 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Updated 9 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆507Updated 6 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 10 years ago
- OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/☆654Updated last year
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆493Updated 4 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301Updated 9 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆759Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Updated 2 years ago
- Powershell C2 Server and Implants☆573Updated 6 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,129Updated 4 years ago
- A WebSocket C2 Tool☆410Updated 8 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Updated 9 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,320Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆458Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- Malicious Macro Generator☆827Updated 6 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,013Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Vulnerability Labs for security analysis☆1,174Updated 4 years ago