k4sth4 / Creating-a-Malicious-docLinks
Creating a Malicious Macro using MS Word
☆24Updated 3 years ago
Alternatives and similar repositories for Creating-a-Malicious-doc
Users that are interested in Creating-a-Malicious-doc are comparing it to the libraries listed below
Sorting:
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆114Updated 5 months ago
- ☆79Updated 7 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- ☆94Updated 10 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- LDAP Enumeration Tool for Pentesters☆48Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- linikatz is a tool to attack AD on UNIX☆151Updated 2 years ago
- ☆91Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated last year
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆38Updated 8 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆48Updated last year
- ☆121Updated 6 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- ☆18Updated last year
- ☆24Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆26Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 10 months ago
- ☆101Updated 10 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 7 months ago
- Used to get NTLMv2 Hashes from SMB☆22Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated last week
- ☆36Updated last year
- Decrypt Chromium based browser passwords with PowerShell.☆127Updated 3 weeks ago
- Most Responder's configuration power in your hand.☆51Updated 10 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆131Updated 10 months ago
- ☆15Updated 2 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆138Updated 2 years ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆42Updated 10 months ago