Generate a reverse shell macro for Word documents.
☆39May 28, 2022Updated 3 years ago
Alternatives and similar repositories for macro_reverse_shell
Users that are interested in macro_reverse_shell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My OSCP notes. Might help you! Happy to get feedback to improve this package.☆25Jun 24, 2025Updated 9 months ago
- Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability)☆15Nov 21, 2022Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- ☆11Jun 26, 2024Updated last year
- A simple SHELL written in HTML and PHP can be used for performing RFI(Remote File Inclusion) & LFI(Local File Inclusion).☆18Aug 27, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated 2 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Joplin storage for Read It Later and Bookmarking☆11Feb 7, 2019Updated 7 years ago
- DEFCON-RUSSIA WEB☆13Mar 30, 2021Updated 5 years ago
- ☆10Dec 2, 2016Updated 9 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 3 years ago
- Dockers for all the online challenges on X-MAS CTF 2018☆17Dec 24, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CTF writeups☆15Nov 25, 2025Updated 4 months ago
- Filesystem interaction via firebeam virtual machine execution☆49Mar 26, 2026Updated 2 weeks ago
- ☆12Aug 23, 2019Updated 6 years ago
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Aug 20, 2022Updated 3 years ago
- A minimal SOCKS5 proxy written in C.☆12Mar 8, 2021Updated 5 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- C2 Server for pentesting, exploitation, and payload creation☆13Jul 17, 2024Updated last year
- ☆52Oct 10, 2025Updated 6 months ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆13Aug 31, 2020Updated 5 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Aug 2, 2021Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33May 28, 2019Updated 6 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Shaco is a linux agent for havoc☆171Oct 25, 2023Updated 2 years ago
- ☆17Apr 5, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- Blacklist for Crypto Wallet scams and Newly Registered Domains☆12Nov 6, 2024Updated last year
- dockerfile of Acunetix Web Vulnerability Scanner14(210615184)☆14Jun 24, 2021Updated 4 years ago
- ☆10Mar 15, 2017Updated 9 years ago
- ☆13Jul 8, 2020Updated 5 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago