coldfusion39 / inject-macroLinks
Inject VBA macro code into Excel documents
☆28Updated 9 years ago
Alternatives and similar repositories for inject-macro
Users that are interested in inject-macro are comparing it to the libraries listed below
Sorting:
- Software exploitation training material☆15Updated 7 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 10 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 4 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Set of ultra technical notes about AD☆18Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Python script to compress VBA macro files☆24Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- PowerShell Runspace Connect-Back Shell☆26Updated 9 years ago
- ☆50Updated 7 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆24Updated 6 months ago
- ☆25Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- ☆13Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Updated 6 years ago