k4sth4 / Creating-a-Malicious-doc
Creating a Malicious Macro using MS Word
☆19Updated 2 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc:
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated 2 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆78Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 5 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 2 weeks ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆39Updated 8 months ago
- ☆33Updated 2 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- ☆58Updated 4 months ago
- ShuckNT is the script of Shuck.sh online service for on-premise use. It is design to dowgrade, convert, dissect and shuck authentication …☆68Updated 3 months ago
- ☆47Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 3 months ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated last year
- ☆51Updated last year
- ☆34Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆21Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆43Updated last year
- Inject RDPThief into memory with PowerShell.☆59Updated 3 weeks ago
- ☆78Updated last month
- A repository with my code snippets for research/education purposes.☆49Updated last year
- ☆14Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- My Favorite Offensive Security Scripts☆66Updated last year
- Windows priviledge escalation script☆13Updated 2 weeks ago
- A Moodle Scanner☆39Updated 2 months ago