k4sth4 / Creating-a-Malicious-docLinks
Creating a Malicious Macro using MS Word
☆23Updated 3 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
Sorting:
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 10 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last week
- ☆90Updated 6 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆106Updated 3 weeks ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆33Updated 4 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆20Updated last year
- ☆70Updated 4 months ago
- ☆21Updated last year
- ☆75Updated 3 months ago
- ☆112Updated 2 months ago
- A Moodle Scanner☆42Updated 8 months ago
- ☆92Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆113Updated 6 months ago
- ☆86Updated 5 months ago
- My Favorite Offensive Security Scripts☆75Updated 3 months ago
- ☆15Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆56Updated 7 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆59Updated last month
- ☆105Updated 10 months ago
- ☆36Updated 8 months ago
- A C2 framework built for my bachelors thesis☆55Updated 9 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆133Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆153Updated 5 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆48Updated 7 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 6 months ago
- Simple netexec wraper with html repport☆19Updated last year