Creating a Malicious Macro using MS Word
☆26Jun 10, 2022Updated 3 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
Sorting:
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (C…☆12May 26, 2025Updated 9 months ago
- CVE-2025-31324, SAP Exploit☆25Apr 28, 2025Updated 10 months ago
- ☆25Jan 23, 2025Updated last year
- A simple demo to autorun beef modules.☆16Aug 19, 2023Updated 2 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 3 years ago
- ☆23Nov 18, 2021Updated 4 years ago
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆24Jan 5, 2023Updated 3 years ago
- CVE-2022-30190 | MS-MSDT Follina One Click☆20Jun 3, 2022Updated 3 years ago
- POC of GITHUB simple C2 in rust☆52Jul 27, 2025Updated 7 months ago
- POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox☆21Aug 9, 2022Updated 3 years ago
- CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message(…☆19Jun 4, 2021Updated 4 years ago
- ☆26Sep 1, 2022Updated 3 years ago
- Custom queries list for BloodHound☆31Jul 8, 2025Updated 7 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆36Oct 1, 2025Updated 5 months ago
- Things i do because i saw it on twitter on a weekend☆57Jul 20, 2025Updated 7 months ago
- ☆33Jul 4, 2023Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- ☆68Jan 16, 2025Updated last year
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- ☆11Feb 28, 2022Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Dec 19, 2023Updated 2 years ago
- [Patched] Sandbox escape Chrome exploit. Allows the execution of local binaries, read/write functions and exfiltration of Chrome OAuth to…☆29Oct 13, 2017Updated 8 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- AV Evasion Techniques☆83Jul 28, 2022Updated 3 years ago
- Remote Code Execution Exploit in the RPC Library☆27Apr 19, 2022Updated 3 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- ☆10Feb 23, 2026Updated last week
- PS-MOTW: PowerShell scripts to set / show / remove MOTW (Mark of the Web)☆57Nov 16, 2023Updated 2 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- Ask ChatGPT directly from the Chrome address bar (omnibox)☆10Mar 23, 2023Updated 2 years ago
- Project the video stream of the Raspberry Pi camera onto a plane in A-Frame VR.☆10Jul 26, 2018Updated 7 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago