Generate a reverse shell macro for Word documents.
☆39May 28, 2022Updated 3 years ago
Alternatives and similar repositories for macro_reverse_shell
Users that are interested in macro_reverse_shell are comparing it to the libraries listed below
Sorting:
- Reverse SSH C2☆35Sep 19, 2025Updated 6 months ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- ☆11Jun 26, 2024Updated last year
- Aspx reverse shell☆120Feb 4, 2020Updated 6 years ago
- Study notes on Windows NTLM Reflection and token stealing based EOPs.☆20May 5, 2021Updated 4 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- Joplin storage for Read It Later and Bookmarking☆11Feb 7, 2019Updated 7 years ago
- ☆16Sep 21, 2025Updated 6 months ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 4 years ago
- CS 495/595 Web Security☆10Feb 27, 2022Updated 4 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- Dockers for all the online challenges on X-MAS CTF 2018☆17Dec 24, 2018Updated 7 years ago
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Filesystem interaction via firebeam virtual machine execution☆34Mar 14, 2026Updated last week
- ☆12Aug 23, 2019Updated 6 years ago
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Aug 20, 2022Updated 3 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- ☆52Oct 10, 2025Updated 5 months ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- Shaco is a linux agent for havoc☆170Oct 25, 2023Updated 2 years ago
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- ☆17Updated this week
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- ☆10Mar 15, 2017Updated 9 years ago
- ☆12Jul 8, 2020Updated 5 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago