glinares / VBA-Stendhal
Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware
☆38Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for VBA-Stendhal
- ☆37Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- ☆37Updated 6 years ago
- Bypass AMSI and Defender using Ordinal Values☆40Updated 4 years ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆35Updated 5 years ago
- ☆44Updated 4 years ago
- C# port of LogServiceCrash☆45Updated 4 years ago
- ☆69Updated 3 years ago
- Suite of Shellcode Running Utilities☆106Updated 4 years ago
- A simple proof of concept for detecting use of Cobalt Strike's execute-assembly☆58Updated 2 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- Port of Invoke-Excel4DCOM☆100Updated 5 years ago
- D/Invoke port of UrbanBishop☆29Updated 3 years ago
- ☆45Updated 3 years ago
- A more obfuscated CactusTorch targeted towards office☆31Updated 3 years ago
- My musings with C#☆28Updated last year
- ☆69Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆86Updated 4 years ago
- Easily serve HTTP and DNS keys for proper payload protection☆60Updated 6 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28Updated 5 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆39Updated 4 years ago
- Service Enumeration C# .NET Assembly☆59Updated 3 years ago
- Helper script for mangling CS payloads☆52Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆66Updated 3 years ago
- Smart overlay for Cobalt Strike PS function☆30Updated 5 years ago
- Walking the PEB in VBA☆22Updated 4 years ago