srnframe / eviloffice
Inject Macro and DDE code into Excel and Word documents (reverse shell)
☆56Updated 3 years ago
Alternatives and similar repositories for eviloffice:
Users that are interested in eviloffice are comparing it to the libraries listed below
- Disable Windows Defender All Version☆31Updated 4 years ago
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆48Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 4 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 3 weeks ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- ☆17Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- testing123☆11Updated 4 months ago
- Reverse shell macro using Word VBA☆14Updated 4 years ago
- ☆12Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- A little implant which SSH's back with a shell☆36Updated 3 years ago
- webshells written with malice☆22Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- ☆32Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Antiscan.me automatization script☆26Updated 10 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago