Tool to manipulate and weaponize Office Open XML documents.
☆71Mar 27, 2023Updated 2 years ago
Alternatives and similar repositories for doctrack
Users that are interested in doctrack are comparing it to the libraries listed below
Sorting:
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- ☆19Dec 18, 2024Updated last year
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- .NET/PowerShell/VBA Offensive Security Obfuscator☆515Feb 1, 2024Updated 2 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Ps1jacker is a tool for generating COM Hijacking payload.☆60Feb 11, 2025Updated last year
- Apply a filter to the events being reported by windows event logging☆262Apr 24, 2021Updated 4 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Pass the Hash to a named pipe for token Impersonation☆312Nov 29, 2023Updated 2 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- PoC to self-delete a binary in C#☆35Feb 6, 2024Updated 2 years ago
- PoC for hiding PE exports☆67Dec 19, 2020Updated 5 years ago
- ☆263Apr 10, 2023Updated 2 years ago
- A tool to create COM class/interface relationships in neo4j☆50Oct 12, 2022Updated 3 years ago
- ☆19Sep 15, 2021Updated 4 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆718Aug 17, 2021Updated 4 years ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- ☆24Sep 26, 2021Updated 4 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- Windows Privilege Escalation from User to Domain Admin.☆1,439Dec 18, 2022Updated 3 years ago
- Hide cool stuff in images :)☆147Aug 9, 2020Updated 5 years ago
- Cobalt Strike Aggressor extension for Visual Studio Code☆138Jun 20, 2024Updated last year
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypass☆18Nov 4, 2017Updated 8 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆179Apr 25, 2020Updated 5 years ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago