MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office documents. The tool streamlines the workflow for security professionals during penetration tests and security assessments, particularly for phishing simulations.
☆19Mar 20, 2025Updated last year
Alternatives and similar repositories for MacroPhantom
Users that are interested in MacroPhantom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- AutoMSF is a Python script designed for fast generation and deployment of multiple types of Meterpreter reverse_https payloads. Created t…☆19Mar 20, 2025Updated last year
- break link between dll and it file on disk☆12Sep 2, 2024Updated last year
- A powerful Burp Suite extension that helps in converting requests between different formats, making web application testing more efficien…☆13Nov 18, 2024Updated last year
- Utterly unelegant prompts for local LLMs, with scary results.☆26Aug 22, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆23Feb 8, 2026Updated last month
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 10 months ago
- The iOS Buster is a groundbreaking penetration testing tool for iOS, capable of performing both static and dynamic testing. It provides d…☆26Mar 31, 2024Updated last year
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- ☆82Apr 9, 2024Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- My thoughts from going through the OSEP materials.☆20Jan 8, 2021Updated 5 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- ☆14Apr 29, 2019Updated 6 years ago
- Python decoder for ACARS messages, roughly inspired by wireshark☆14Mar 26, 2019Updated 7 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- How to use math formulas in GitHub Markdown documents☆11May 10, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆57Jan 15, 2024Updated 2 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- AV Evasion Techniques☆83Jul 28, 2022Updated 3 years ago
- A simple and stable proxy DLL for Windows x64☆16May 31, 2021Updated 4 years ago
- Simple tool/script for generating malicious Linux shared libraries☆35Sep 1, 2021Updated 4 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- Scalable URL obfuscator service☆11Feb 14, 2023Updated 3 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- The Frida Scripts Fetcher & Exploiter tool helps you search and use those scripts to exploit based on the provided search keyword.☆18Aug 5, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Postfix SMTP Smuggling - Expect Script POC☆23Dec 26, 2023Updated 2 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- A 1014 Byte ELF64/DOS.COM/GameBoy/Megadrive/PDF/ARJ/PKZIP/7zip Polyglot Binary☆13Sep 8, 2022Updated 3 years ago
- Finding secrets in various (non-text) popular files.☆53Oct 21, 2025Updated 5 months ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Mar 15, 2021Updated 5 years ago
- Scapy hands-on at #GreHack17☆17Nov 14, 2017Updated 8 years ago