danielwolfman / Invoke-WordThiefLinks
This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM Object. The script adds HKCU registry (no admin needed) Run key, so this script runs persistently.
☆33Updated 4 years ago
Alternatives and similar repositories for Invoke-WordThief
Users that are interested in Invoke-WordThief are comparing it to the libraries listed below
Sorting:
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- ☆20Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆14Updated 3 years ago
- Continuous kerberoast monitor☆45Updated last year
- Helpful operator notes and techniques in actionable form☆17Updated last year
- ☆16Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Active Directory information dumper via LDAP☆12Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 2 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- UglyEXe - bypass some AVs☆17Updated 5 years ago
- ☆18Updated last year