danielwolfman / Invoke-WordThief
This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM Object. The script adds HKCU registry (no admin needed) Run key, so this script runs persistently.
☆32Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Invoke-WordThief
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆19Updated 2 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆42Updated last year
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆26Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 3 years ago
- My python3 implementation of a Forward Shell☆35Updated 5 years ago
- ☆16Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 2 years ago
- ☆18Updated 4 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆28Updated 6 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Repository for LNK stuff☆27Updated 2 years ago
- Helpful operator notes and techniques in actionable form☆16Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- UglyEXe - bypass some AVs☆16Updated 4 years ago
- pypykatz plugin for volatility3 framework☆31Updated 7 months ago
- Continuous kerberoast monitor☆43Updated last year
- Test Azure environment for MFA misconfigurations☆10Updated last year
- Scripts for OSCE☆18Updated 5 years ago