k4sth4 / Creating-a-Malicious-doc
Creating a Malicious Macro using MS Word
☆16Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Creating-a-Malicious-doc
- ☆46Updated 2 years ago
- A C2 framework built for my bachelors thesis☆53Updated last week
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆54Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- ☆24Updated last year
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 5 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 10 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last month
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 11 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆32Updated last year
- Linux Post-Exploitation tools wrapper☆20Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 10 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆15Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- exfiltration/infiltration toolkit☆23Updated 10 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Windows Privilege Escalation☆42Updated 2 years ago
- ☆14Updated 10 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆22Updated 2 years ago
- Azure Service Subdomain Enumeration☆42Updated 2 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆36Updated last week
- Inject RDPThief into memory with PowerShell.☆55Updated last month
- Phishing Framework for OTP codes☆17Updated 3 months ago