k4sth4 / Creating-a-Malicious-doc
Creating a Malicious Macro using MS Word
☆21Updated 2 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc:
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 7 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- ☆17Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆43Updated 5 months ago
- ☆14Updated last year
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- ☆83Updated 3 months ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆36Updated last year
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 5 months ago
- ☆34Updated 4 months ago
- Used to get NTLMv2 Hashes from SMB☆12Updated 6 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆27Updated 3 months ago
- #cheat sheet for OSWP☆8Updated 4 years ago
- ☆38Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- PowerShell Reverse Shell☆61Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- LDAP Enumeration Tool for Pentesters☆31Updated this week
- ☆20Updated last year
- ☆38Updated this week
- ☆51Updated last year
- A Moodle Scanner☆40Updated 5 months ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago