Stars
Collaborative office suite, end-to-end encrypted and open-source.
A wanna be swiss army knife for data encryption, exfiltration and covert communication.
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Stealing Signatures and Making One Invalid Signature at a Time
Python / C# Unmanaged PowerShell based RAT
CACTUSTORCH: Payload Generation for Adversary Simulations
This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploitation techniques.
A tool to create a JScript file which loads a .NET v2 assembly from memory.
XOR encryption implementations for several languages.
netshell features all in version 2 powershell
PowerShell Pass The Hash Utils
DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any machine, powershell modules, and Dropbox servers as a means o…
.NET IPv4/IPv6 machine-in-the-middle tool for penetration testers
a easy solution for simple IMAP email access in php