danielwolfman / Invoke-WordThiefLinks
This script runs multithreading module that connects to a remote TCP server, monitors active (opened) Microsoft Word documents (.doc,.docx,etc') and extracting their text using Word application's COM Object. The script adds HKCU registry (no admin needed) Run key, so this script runs persistently.
☆33Updated 5 years ago
Alternatives and similar repositories for Invoke-WordThief
Users that are interested in Invoke-WordThief are comparing it to the libraries listed below
Sorting:
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆23Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 3 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 5 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- ☆20Updated 5 years ago
- ☆14Updated 4 years ago
- Tests AD passwords while respecting Bad Password Count☆18Updated 6 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24Updated 3 years ago
- ☆36Updated 5 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆80Updated 4 years ago
- Python Script for SAML2 Authentication Passwordspray☆42Updated 2 years ago