jotyGill / macro-generatorLinks
Generate malicious macros for MS Office and Libreoffice, created during OSCP prep
☆22Updated 2 years ago
Alternatives and similar repositories for macro-generator
Users that are interested in macro-generator are comparing it to the libraries listed below
Sorting:
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 11 months ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- ☆23Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆35Updated this week
- A little cheatsheet for NetExec☆31Updated last year
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- Most Responder's configuration power in your hand.☆51Updated 11 months ago
- Tool for enumerating Active Directory environments☆49Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- A C2 framework built for my bachelors thesis☆54Updated 3 weeks ago
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆184Updated last year
- linikatz is a tool to attack AD on UNIX☆153Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated 2 years ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆90Updated 5 months ago
- ☆103Updated 10 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- Azure Service Subdomain Enumeration☆68Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆120Updated 11 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Simple PoC in PowerShell for CVE-2023-23397☆39Updated 2 years ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆79Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆90Updated last year
- sl0ppy-PrivescTaskCreator.ps1☆37Updated 2 months ago
- 🌩️ Collection of BloodHound queries for Azure☆81Updated 11 months ago
- My Favorite Offensive Security Scripts☆79Updated 8 months ago
- Slinky Cat attempts to give users an easy-to-navigate menu offering predefined Active Directory Service Interfaces (ADSI) and .NET querie…☆80Updated 2 years ago
- ☆120Updated 6 months ago
- ☆73Updated 9 months ago