Custom built Syntax Highlight tool for Word Documents
☆27Sep 13, 2024Updated last year
Alternatives and similar repositories for vba-syntax-highlight
Users that are interested in vba-syntax-highlight are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆28Oct 15, 2025Updated 6 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆67Nov 14, 2025Updated 5 months ago
- POC for CVE-2025-54918 and a technical demonstration.☆57Jan 12, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- A SQLite extension for extracting values from serialized protobuf messages without the need for the protobuf definition (.proto file)☆18Oct 21, 2025Updated 6 months ago
- Monitor your study sessions, log your study hours, set goals, and watch your productivity progress.☆10May 19, 2024Updated last year
- Two WinForms GUI tools for enumerating, searching, and exfiltrating data from M365 environments using application-level OAuth tokens☆212Mar 4, 2026Updated 2 months ago
- With zero dependencies, NetCredz extracts credentials from pcap files or live traffic, supporting NTLM, LDAP, HTTP, SMTP, SNMP, Telnet, F…☆79Dec 2, 2024Updated last year
- This free tool parses Google Takeout Location History Exports or Google Semantic Location History Warrant Return Data in a forensic manne…☆40Sep 26, 2025Updated 7 months ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆27Dec 8, 2025Updated 5 months ago
- The source code of iDecryptIt - an IPSW firmware decryption tool☆17Mar 11, 2026Updated last month
- Windows Forensics Salt States☆22Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Web app built to allow digital forensic professionals to search for the forensic tools that will parse artifacts from various apps.☆18Apr 30, 2025Updated last year
- ☆24Sep 6, 2025Updated 8 months ago
- ☆12Oct 10, 2024Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 8 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- Inject RDPThief into memory with PowerShell.☆66Jan 21, 2025Updated last year
- ☆15Nov 18, 2020Updated 5 years ago
- Artemis - C++ Hell's Gate Syscall Implementation☆34Aug 16, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A Beacon Object File suite for Microsoft SQL Server that speaks TDS 7.4 on the wire itself☆94Apr 9, 2026Updated last month
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- ☆51Feb 8, 2024Updated 2 years ago
- APKrash is an Android APK security analysis toolkit focused on comparing APKs to detect tampering and repackaging.☆34Apr 27, 2026Updated last week
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- A reconnaissance tool for ethical hackers written in RUST☆21Apr 8, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- C# Library and research notes for Windows 11 Notepad State Files☆31Oct 30, 2025Updated 6 months ago
- Port of the EDRSilencer tool (https://github.com/netero1010/EDRSilencer) to BOF format☆34Oct 22, 2024Updated last year
- A simple, LFI vulnerable PHP application☆19Sep 27, 2018Updated 7 years ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆33Sep 5, 2025Updated 8 months ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- Living off the land searches for explorer and sharepoint☆97Dec 7, 2025Updated 5 months ago
- Automatically password protect (with encryption) certain pages on GitHub Pages/Jekyll sites using PageCrypt.☆28Feb 1, 2025Updated last year