ethanhunnt / Hover_with_PowerView external linksLinks
This repo is dedicated to a powerpoint exploit
☆34Dec 11, 2020Updated 5 years ago
Alternatives and similar repositories for Hover_with_Power
Users that are interested in Hover_with_Power are comparing it to the libraries listed below
Sorting:
- A small example of loading BOFs in Python with pure reflection☆19Jan 26, 2023Updated 3 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆148Sep 7, 2020Updated 5 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Feb 1, 2022Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆34Sep 27, 2021Updated 4 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Sep 23, 2020Updated 5 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Sep 19, 2022Updated 3 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Manticore Adversary Emulation Cli☆47Aug 4, 2020Updated 5 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Red Team Automation tool powered by go and terraform☆33May 26, 2021Updated 4 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- ☆12Oct 15, 2024Updated last year
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 2 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Leghorn code for PKI abuse☆32Jun 17, 2021Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆59Apr 1, 2022Updated 3 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆191May 26, 2020Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- A BOF for enumerating version information for DLLs associated for a Beacon process.☆16Nov 23, 2021Updated 4 years ago
- A CherryTree template for People OSINT. I was inspired by James Hall's CTF template and I used the lessons taught to me by Joe Gray to cr…☆11Aug 16, 2020Updated 5 years ago
- Cobalt Strike Get clipboard plugin☆15Aug 11, 2023Updated 2 years ago
- Slide deck and demo code for my DEFCON 26 talk☆11Aug 17, 2018Updated 7 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆100Oct 12, 2021Updated 4 years ago
- AndrewSpecial, dumping lsass' memory stealthily and bypassing "Cilence" since 2019.☆390Jun 2, 2019Updated 6 years ago
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆57Jun 2, 2024Updated last year