mgeeky / CustomXMLPart
A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.
☆37Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for CustomXMLPart
- Proof of Concept code and samples presenting emerging threat of MSI installer files.☆77Updated last year
- ☆58Updated 11 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆74Updated 5 months ago
- Small project to facilitate creation of .lnk payloads☆62Updated 2 years ago
- Slide decks and/or materials from conference presentations☆54Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 4 months ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆19Updated 2 years ago
- ☆47Updated last year
- ☆51Updated 3 years ago
- ☆68Updated last year
- HelpSystems Nanodump, but wrapped in powershell via Invoke-ReflectivePEInjection☆53Updated 2 years ago
- ☆15Updated last month
- Python module for running BOFs☆64Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆27Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆65Updated last year
- Unchain AMSI by patching the provider’s unmonitored memory space☆88Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆41Updated last month
- Lateral Movement via the .NET Profiler☆76Updated 5 months ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆18Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆39Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- ☆24Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆20Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆78Updated last year
- Token Elevation to authorized user as SYSTEM or Domain Admins☆23Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- A care package of useful bofs for red team engagments☆48Updated 2 years ago