jotyGill / macro-generatorLinks
Generate malicious macros for MS Office and Libreoffice, created during OSCP prep
☆20Updated 2 years ago
Alternatives and similar repositories for macro-generator
Users that are interested in macro-generator are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆51Updated 9 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆43Updated 9 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- A little cheatsheet for NetExec☆28Updated last year
- ☆92Updated this week
- ☆47Updated 3 years ago
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- A Rust-based dropper for shellcode payloads.☆67Updated 7 months ago
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆88Updated 3 months ago
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Updated 2 years ago
- Various AD tools needed for penetration testing in one place.☆24Updated 2 years ago
- Living off the land searches for explorer and sharepoint☆90Updated 6 months ago
- ☆52Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- Deploy a phishing infrastructure on the fly.☆76Updated 10 months ago
- C2 Automation using Linode☆85Updated 3 years ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 3 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated last year
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- Automatically deploy Nemesis☆21Updated last year
- PowerShell Reverse Shell☆79Updated 2 years ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Bounces when a fish bites - Evilginx database monitoring with exfiltration automation☆181Updated last year
- This script analyzes the DCSync output file from several tools (such as Mimikatz, Secretsdump and SharpKatz...)☆61Updated 7 months ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Discord C2 Profile for Mythic☆32Updated 8 months ago
- Custom queries list for BloodHound☆30Updated 3 months ago
- Just some random Red Team Scripts that can be useful☆152Updated last year