danielwolfman / Invoke-WordThief
This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM Object. The script adds HKCU registry (no admin needed) Run key, so this script runs persistently.
☆33Updated 4 years ago
Alternatives and similar repositories for Invoke-WordThief:
Users that are interested in Invoke-WordThief are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- automatic scan for hackthebox☆14Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- ☆14Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Random scripts for azure stuff☆11Updated 2 years ago
- My python3 implementation of a Forward Shell☆35Updated 6 years ago
- parsers to make life easier☆12Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- UglyEXe - bypass some AVs☆16Updated 5 years ago
- Noob Penetration tester☆11Updated 10 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- ☆13Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- ☆19Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 9 months ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆23Updated 2 years ago
- ☆15Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Tests AD passwords while respecting Bad Password Count☆18Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago