cr7pt0 / MacroSploit2Links
MacroSploit is a modified version of unicorn used to generate a social engineering Microsoft Office macro payload for penetration testers . Macros generated include both a Windows Powershell payload and OSX Macscript payload. Original unicorn description - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode stra…
☆8Updated 10 years ago
Alternatives and similar repositories for MacroSploit2
Users that are interested in MacroSploit2 are comparing it to the libraries listed below
Sorting:
- ☆83Updated 9 years ago
- ☆19Updated 8 years ago
- A sample bot for Cobalt Strike 3☆22Updated 9 years ago
- Powershell Persistence Locator☆66Updated 8 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 7 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- ☆58Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆63Updated 7 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆52Updated 7 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 7 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- A relatively flexible tool to parse mimikatz output☆35Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- VBS Reversed TCP Meterpreter Stager☆88Updated 8 years ago
- Quick PoC I Wrote for Bypassing Next Gen AV Remotely for Pentesting☆41Updated 6 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆80Updated 8 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Updated 7 years ago
- SharpCat - A Simple Reversed Command Shell which can be started using InstallUtil (Bypassing AppLocker)☆46Updated 9 years ago
- PIC code gen and loading☆13Updated 7 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 8 years ago
- ☆34Updated 8 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 7 years ago
- MS15-076 Privilege Escalation☆16Updated 9 years ago