Generate malicious macros for MS Office and Libreoffice, created during OSCP prep
☆24Mar 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for macro-generator
Users that are interested in macro-generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gitbook: kashz-Jewels☆21Jul 1, 2025Updated 8 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Reverse ip lookup tool written with go . Bing , Spyse , HackerTarget , ViewDns☆12May 14, 2022Updated 3 years ago
- ☆14Dec 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C# project to Reflectively load .Net assemblies in memory☆19Jun 19, 2024Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆60Apr 27, 2025Updated 10 months ago
- Creating a Malicious Macro using MS Word☆26Jun 10, 2022Updated 3 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆28Oct 15, 2025Updated 5 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- It can do reverse dns lookups from a range of given IP's or a whole subnet.☆13Apr 19, 2018Updated 7 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Jul 19, 2024Updated last year
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 7 months ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆36Feb 16, 2026Updated last month
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- YesMan☆16Nov 8, 2023Updated 2 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆13Nov 29, 2024Updated last year
- SMS or Network Jam attack By:- Dark_knight☆11Sep 30, 2020Updated 5 years ago
- ☆16Jun 4, 2025Updated 9 months ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- A fork (and mirror) of the Buffer Overflow Module created by NSF Award No. 0113627☆11Feb 11, 2017Updated 9 years ago
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Aug 24, 2022Updated 3 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Dominate the Active Directory game. An Active Directory environments pentest tool complementary to existing ones like NetExec.☆19Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts for pushing models to huggingface repos☆15Mar 13, 2026Updated 2 weeks ago
- ☆13May 9, 2023Updated 2 years ago
- ☆16Jun 21, 2024Updated last year
- powershell script to simulate activity by a user☆22Jul 29, 2020Updated 5 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year