enigma0x3 / Old-Powershell-payload-Excel-DeliveryView external linksLinks
This version touches disk for registry persistence.
☆26Oct 6, 2015Updated 10 years ago
Alternatives and similar repositories for Old-Powershell-payload-Excel-Delivery
Users that are interested in Old-Powershell-payload-Excel-Delivery are comparing it to the libraries listed below
Sorting:
- ☆51Feb 5, 2014Updated 12 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Jan 13, 2017Updated 9 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- ☆85May 19, 2015Updated 10 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Apr 26, 2018Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆11Nov 21, 2022Updated 3 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- Nmap NSE scripts☆27Feb 1, 2022Updated 4 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179May 23, 2016Updated 9 years ago
- Stuff that I created while doing my GSM-security research☆22Oct 19, 2013Updated 12 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- #1 DISCORD AIO☆41Mar 10, 2024Updated last year
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago
- A simple KeyLogger written in Plain JavaScript. Send data to PHP server.☆21Aug 25, 2018Updated 7 years ago
- Hacking the target computer and receiving complete information such as passwords stored in the browser, session theft, cookie theft, cred…☆19Jul 26, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Mar 19, 2020Updated 5 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Nov 11, 2014Updated 11 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 8 years ago