DDE attack with PowerShell Empire Logo

DDE attack with PowerShell Empire

0
Free
Updated 11 March 2025
Visit Website

The DDE attack with PowerShell Empire allows for weaponizing a Word document with a PowerShell Empire-based payload, leveraging the Microsoft DDE exploit to execute code in MS Word and other Microsoft products. For more information, refer to the original research at: https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/ To execute this attack, ensure you have set up an Empire listener.

FEATURES

SIMILAR TOOLS

A quick and dirty dynamic redirect.rules generator for penetration testers and security professionals.

A powerful tool for extracting passwords and performing various Windows security operations.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

Collection of penetration testing scripts for AWS with a focus on reconnaissance.

An open-source intelligence collection, research, and artifact management tool inspired by SpiderFoot, Harpoon, and DataSploit.

Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

Local pentest lab using docker compose to spin up victim and attacker services.

AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved