Tool to manipulate and weaponize Office Open XML documents.
☆71Mar 27, 2023Updated 2 years ago
Alternatives and similar repositories for doctrack
Users that are interested in doctrack are comparing it to the libraries listed below
Sorting:
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- ☆19Dec 18, 2024Updated last year
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆520Feb 1, 2024Updated 2 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- VBScript minifier☆25Updated this week
- Pass the Hash to a named pipe for token Impersonation☆311Nov 29, 2023Updated 2 years ago
- Hide cool stuff in images :)☆147Aug 9, 2020Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Purple Team Dropper generator using open source templates.☆17May 23, 2024Updated last year
- Apply a filter to the events being reported by windows event logging☆263Apr 24, 2021Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- PoC to self-delete a binary in C#☆36Feb 6, 2024Updated 2 years ago
- adding a backdooruser using win32api☆80Sep 3, 2020Updated 5 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Aug 17, 2021Updated 4 years ago
- A Beacon Object File (BOF) for Cobalt Strike which uses direct system calls to enable WDigest credential caching.☆220May 3, 2023Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- Executes position independent shellcode from an encrypted zip☆304Dec 22, 2020Updated 5 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- Trigen is a Python script which uses different combinations of Win32 function calls in generated VBA to execute shellcode.☆203Jul 2, 2017Updated 8 years ago
- Enumerate Domain Data☆335Sep 13, 2023Updated 2 years ago
- Windows Privilege Escalation from User to Domain Admin.☆1,451Dec 18, 2022Updated 3 years ago
- ☆24Jun 29, 2020Updated 5 years ago