rvrsh3ll / Word-Doc-Video-Embed-EXE-POCView external linksLinks
☆94Nov 1, 2018Updated 7 years ago
Alternatives and similar repositories for Word-Doc-Video-Embed-EXE-POC
Users that are interested in Word-Doc-Video-Embed-EXE-POC are comparing it to the libraries listed below
Sorting:
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.☆152Jun 3, 2019Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Run shellcode from resource☆260Dec 13, 2020Updated 5 years ago
- ☆210Jan 30, 2019Updated 7 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- Process reimaging proof of concept code☆97Jun 21, 2019Updated 6 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- Aggressor scripts for phases of a pen test or red team assessment☆183Aug 13, 2024Updated last year
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- ☆14Oct 25, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- DoHC2 allows the ExternalC2 library from Ryan Hanson (https://github.com/ryhanson/ExternalC2) to be leveraged for command and control (C2…☆448Aug 7, 2020Updated 5 years ago
- Cobalt Strike SCT payload obfuscator☆143Jul 7, 2017Updated 8 years ago
- ☆182Feb 21, 2022Updated 3 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Discover Printers☆168Sep 18, 2019Updated 6 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- A C# tool to search through a running instance of Outlook for keywords☆111Jan 14, 2021Updated 5 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated last year
- Windows Stagers to circumvent restrictive network environments☆68Sep 23, 2024Updated last year
- Hide .Net assembly into png images☆36Aug 11, 2019Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- ☆43Aug 1, 2019Updated 6 years ago
- ☆281Dec 30, 2020Updated 5 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆144Oct 24, 2021Updated 4 years ago
- PowerShell and Cobalt Strike scripts for lateral movement using Excel 4.0 / XLM macros via DCOM (direct shellcode injection in Excel.exe)☆328Mar 26, 2019Updated 6 years ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Apr 28, 2020Updated 5 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago