mgeeky / CustomXMLPart
A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.
☆38Updated 2 years ago
Alternatives and similar repositories for CustomXMLPart:
Users that are interested in CustomXMLPart are comparing it to the libraries listed below
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆81Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Updated 2 years ago
- ☆59Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 3 weeks ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated 7 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ☆17Updated 6 months ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆66Updated 9 months ago
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated 3 weeks ago
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆55Updated 3 years ago
- ☆57Updated 3 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆74Updated 2 years ago
- maldev obviously☆26Updated 2 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Updated last year
- ☆48Updated last year
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- Small project to facilitate creation of .lnk payloads☆65Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- This code example allows you to create a malware.exe sample that can be run in the context of a system service, and could be used for loc…☆51Updated last year
- Lateral Movement via the .NET Profiler☆81Updated 5 months ago
- Python module for running BOFs☆68Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆80Updated last year
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago