This version touches disk for registry persistence.
☆27Oct 6, 2015Updated 10 years ago
Alternatives and similar repositories for Old-Powershell-payload-Excel-Delivery
Users that are interested in Old-Powershell-payload-Excel-Delivery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆51Feb 5, 2014Updated 12 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Jan 13, 2017Updated 9 years ago
- ☆47Nov 18, 2015Updated 10 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- Stuff that I created while doing my GSM-security research☆22Oct 19, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆179May 23, 2016Updated 9 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- IPV6 MITM attack tool☆92Aug 7, 2013Updated 12 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- A small to find Host Header Injection vulnerabilities in a websites☆12Nov 21, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Scripts that aren't PowerShell☆48Jan 13, 2020Updated 6 years ago
- Scripts that disables unwanted windows features☆15Jan 6, 2023Updated 3 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- A collection of Nmap NSE scripts that I made.☆30Jan 14, 2013Updated 13 years ago
- Record and playback a terminal session☆15Feb 4, 2013Updated 13 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆687Oct 27, 2016Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- PowerShell scripts for setting up a new Windows 10 machine.☆14Dec 12, 2018Updated 7 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A few simple scripts and templates I have used during various phishing engagements.☆59Apr 3, 2015Updated 10 years ago
- ☆15Aug 13, 2014Updated 11 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- Gain root privilege on older Android devices.☆22Apr 17, 2015Updated 10 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago