xbz0n / MacroPhantomLinks
MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office documents. The tool streamlines the workflow for security professionals during penetration tests and security assessments, particularly for phishing simulations.
☆14Updated 4 months ago
Alternatives and similar repositories for MacroPhantom
Users that are interested in MacroPhantom are comparing it to the libraries listed below
Sorting:
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆13Updated 4 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 11 months ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 5 months ago
- ☆28Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆36Updated last month
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Windows priviledge escalation script☆13Updated 5 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Updated last year
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Discord C2 Profile for Mythic☆30Updated 5 months ago
- ☆27Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated last year
- Multithreaded spraying of a password on all accounts of a domain.☆21Updated 5 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆23Updated 11 months ago
- Quicky serve files over http or https using flask.☆35Updated 5 months ago
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆42Updated 6 months ago
- ☆22Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- ☆57Updated 8 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- Slides and videos from talks given at cons☆23Updated last month
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago