jotyGill / macro-generator
Generate malicious macros for MS Office and Libreoffice, created during OSCP prep
☆19Updated 2 years ago
Alternatives and similar repositories for macro-generator:
Users that are interested in macro-generator are comparing it to the libraries listed below
- a simple powershell wrapper to automate checking a user's access around the network☆13Updated last year
- ☆47Updated 2 years ago
- IP address filter by City☆11Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆24Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 10 months ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- ☆45Updated last week
- 🌩️ Collection of BloodHound queries for Azure☆60Updated 2 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated last week
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- PowerShell Reverse Shell☆61Updated last year
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆76Updated last month
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆23Updated 2 months ago
- Most Responder's configuration power in your hand.☆46Updated 2 months ago
- Goscan is a fast TCP scanner I created while learning Golang.☆52Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Automatically deploy Nemesis☆20Updated 9 months ago
- Living off the land searches for explorer and sharepoint☆57Updated 4 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Discord C2 Profile for Mythic☆28Updated last month
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆34Updated 2 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- An Ansible collection that installs an ADFS deployment with optional configurations.☆27Updated 3 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆42Updated 9 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- ☆13Updated 2 months ago