martinsohn / Office-phish-templates
Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from target user via verious methods.
☆166Updated 3 years ago
Alternatives and similar repositories for Office-phish-templates:
Users that are interested in Office-phish-templates are comparing it to the libraries listed below
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆255Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆151Updated last year
- Modular C# framework to exfiltrate loot over secure and trusted channels.☆122Updated 3 years ago
- Inject remote template link into word document for remote template injection☆165Updated 3 years ago
- ☆358Updated 3 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆468Updated last year
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆378Updated last year
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆383Updated 10 months ago
- Run Powershell without software restrictions.☆284Updated 3 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- ☆189Updated 5 years ago
- ☆186Updated last week
- PowerShell Constrained Language Mode Bypass☆242Updated 3 years ago
- Remotely enables Restricted Admin Mode☆206Updated 3 years ago
- ☆96Updated 2 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆294Updated 2 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆140Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated last year
- Koppeling x Metatwin x LazySign☆205Updated 3 years ago
- A tool for pointesters to find candies in SharePoint☆242Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆79Updated 2 years ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆317Updated 11 months ago
- Roast in the Middle☆287Updated 2 months ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆328Updated 3 years ago
- ☆164Updated 2 years ago
- Shellcode launcher for AV bypass☆218Updated last year
- A User Impersonation tool - via Token or Shellcode injection☆407Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆456Updated 2 years ago
- OPSEC safe Kerberoasting in C#☆189Updated 2 years ago
- Bypassing AppLocker with C#☆137Updated 3 years ago