k4sth4 / Creating-a-Malicious-docLinks
Creating a Malicious Macro using MS Word
☆24Updated 3 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated last month
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆109Updated 2 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- ☆91Updated 8 months ago
- linikatz is a tool to attack AD on UNIX☆150Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆62Updated 8 months ago
- Simple netexec wraper with html repport☆19Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- ☆76Updated 4 months ago
- ☆112Updated 3 months ago
- Used to get NTLMv2 Hashes from SMB☆17Updated 10 months ago
- ☆15Updated last year
- ☆25Updated last year
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆122Updated 5 months ago
- A Moodle Scanner☆42Updated 10 months ago
- ☆71Updated 6 months ago
- Ready to go Phishing Platform☆56Updated 11 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆130Updated 7 months ago
- Inject RDPThief into memory with PowerShell.☆65Updated 7 months ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆36Updated 5 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆135Updated 2 years ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 2 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated last year
- Azure Service Subdomain Enumeration☆66Updated last year