DDE attack with PowerShell Empire Logo

DDE attack with PowerShell Empire

0
Free
Visit Website

The DDE attack with PowerShell Empire allows for weaponizing a Word document with a PowerShell Empire-based payload, leveraging the Microsoft DDE exploit to execute code in MS Word and other Microsoft products. For more information, refer to the original research at: https://sensepost.com/blog/2017/macro-less-code-exec-in-msword/ To execute this attack, ensure you have set up an Empire listener.

FEATURES

ALTERNATIVES

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.

Automatic SSRF fuzzer and exploitation tool

Pentest active directory LAB project for practicing attack techniques.

A blog post discussing the often overlooked dangers of CSV injection in applications.

Boofuzz is a network protocol fuzzing tool that aims to fuzz everything

A Python library for exploiting race conditions in web apps

A tutorial on how to use Apache mod_rewrite to randomly serve payloads in phishing attacks

Setup script for Regon-ng