cedowens / EvilOSX_MacroGenerator
Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens
☆26Updated 4 years ago
Alternatives and similar repositories for EvilOSX_MacroGenerator:
Users that are interested in EvilOSX_MacroGenerator are comparing it to the libraries listed below
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Passwordless RDP Session Hijacking☆65Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- ☆19Updated 7 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Unofficial API for 0day.today database | Supported languages: Python and PHP☆12Updated 5 years ago
- ☆24Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Methods of C2☆21Updated 9 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆15Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago