danielwolfman / Invoke-WordThief
This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM Object. The script adds HKCU registry (no admin needed) Run key, so this script runs persistently.
☆33Updated 4 years ago
Alternatives and similar repositories for Invoke-WordThief:
Users that are interested in Invoke-WordThief are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆28Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- ☆20Updated 5 years ago
- parsers to make life easier☆13Updated 4 years ago
- ☆16Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆30Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Random code snippets☆10Updated last year
- ☆17Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Methods of C2☆21Updated 9 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Walking the PEB in VBA☆23Updated 5 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆21Updated 5 months ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Updated 4 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago