xbz0n / MacroPhantomLinks
MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office documents. The tool streamlines the workflow for security professionals during penetration tests and security assessments, particularly for phishing simulations.
☆16Updated 8 months ago
Alternatives and similar repositories for MacroPhantom
Users that are interested in MacroPhantom are comparing it to the libraries listed below
Sorting:
- Discord C2 Profile for Mythic☆33Updated 9 months ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated 10 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- ☆53Updated 2 years ago
- ☆59Updated last year
- ☆108Updated last year
- ☆29Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- A small red team course☆40Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Updated 2 months ago
- Scripts that automate portions of pentests.☆55Updated 4 months ago
- Remote Template Injection Toolkit☆43Updated last year
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Modified version of PEAS client for offensive operations☆43Updated 2 years ago
- ☆27Updated 2 years ago
- ☆45Updated last month
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆71Updated last month
- Cobalt Strike BOFS☆16Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated 11 months ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 10 months ago
- exfiltration/infiltration toolkit☆23Updated last year
- POC for DLL Proxying / Hijacking☆62Updated 6 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆30Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆52Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago