coldfusion39 / inject-macroLinks
Inject VBA macro code into Excel documents
☆28Updated 9 years ago
Alternatives and similar repositories for inject-macro
Users that are interested in inject-macro are comparing it to the libraries listed below
Sorting:
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- Software exploitation training material☆15Updated 8 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆61Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Python script to compress VBA macro files☆24Updated 2 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 12 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- ☆17Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- See here:☆42Updated 12 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- ☆10Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆45Updated 8 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago