k4sth4 / Creating-a-Malicious-docLinks
Creating a Malicious Macro using MS Word
☆24Updated 3 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆111Updated 2 months ago
- ☆92Updated 8 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 2 months ago
- ☆15Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 9 months ago
- ☆77Updated 5 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆71Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆147Updated last year
- Inject RDPThief into memory with PowerShell.☆65Updated 8 months ago
- ☆113Updated 4 months ago
- My Favorite Offensive Security Scripts☆73Updated 5 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆25Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆36Updated 6 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆47Updated last year
- A Moodle Scanner☆43Updated 10 months ago
- ☆25Updated last year
- Used to get NTLMv2 Hashes from SMB☆21Updated 11 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆48Updated 5 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆42Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last year
- Ready to go Phishing Platform☆55Updated 11 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 8 months ago
- ☆93Updated 7 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆115Updated 8 months ago
- ☆20Updated last week
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago