cedowens / EvilOSX_MacroGenerator
Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens
☆26Updated 4 years ago
Alternatives and similar repositories for EvilOSX_MacroGenerator:
Users that are interested in EvilOSX_MacroGenerator are comparing it to the libraries listed below
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Passwordless RDP Session Hijacking☆63Updated 3 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- ☆24Updated 4 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- BlueKeep powershell scanner (based on c# code)☆38Updated 5 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- ☆15Updated 2 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- Red Team C2 and Post Exploitation Code☆36Updated this week
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- ☆16Updated 5 years ago
- fully automated c# reverse shells with automated ssh tunneling☆5Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆35Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Methods of C2☆21Updated 9 years ago