jotyGill / macro-generatorLinks
Generate malicious macros for MS Office and Libreoffice, created during OSCP prep
☆20Updated 2 years ago
Alternatives and similar repositories for macro-generator
Users that are interested in macro-generator are comparing it to the libraries listed below
Sorting:
- ☆79Updated 3 weeks ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆42Updated 7 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆18Updated last month
- Most Responder's configuration power in your hand.☆51Updated 7 months ago
- ☆47Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- Living off the land searches for explorer and sharepoint☆89Updated 3 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆100Updated 2 years ago
- C2 Automation using Linode☆83Updated 2 years ago
- Cortex XDR Config Extractor☆133Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Updated 2 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- ☆51Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆179Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆86Updated last month
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆51Updated 5 months ago
- Custom queries list for BloodHound☆29Updated last month
- ☆105Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 10 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆75Updated 2 years ago
- Automatically deploy Nemesis☆21Updated last year
- Just some random Red Team Scripts that can be useful☆153Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆77Updated 9 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆121Updated last month