chrismaddalena / DocPatchLinks
A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet.
☆11Updated 2 years ago
Alternatives and similar repositories for DocPatch
Users that are interested in DocPatch are comparing it to the libraries listed below
Sorting:
- SharpSvc is a simple code set to interact with the SC Manager API and is compatible with Cobalt Strike.☆26Updated last year
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- Simple .NET assembly to interact with services.☆40Updated 5 years ago
- A more obfuscated CactusTorch targeted towards office☆32Updated 4 years ago
- ☆37Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆32Updated 4 years ago
- ☆32Updated 5 years ago
- My musings with C#☆28Updated 2 years ago
- ☆46Updated 3 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆37Updated 6 years ago
- ☆41Updated 6 years ago
- ☆53Updated 4 years ago
- ☆16Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆87Updated 5 years ago
- ☆18Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 4 years ago
- D/Invoke port of UrbanBishop☆29Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆55Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆29Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- An Ansible role to install cobalt-strike☆16Updated 4 years ago
- aggressor and pycobalt scripts.☆18Updated 4 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 6 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- F# Implementation to spawn shellcode☆47Updated 7 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆46Updated 3 years ago
- BH Cypher Queries picked up from random places☆38Updated 6 years ago
- Service Enumeration C# .NET Assembly☆58Updated 3 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago