GitHub topics: doc-exploit
Vandan8123/The-Titan-Crypter
The-Titan-Crypter is a powerful tool designed to encrypt and obfuscate executable files, enhancing their security against detection. It provides users with a straightforward interface to customize settings and improve the stealth of their applications.
Size: 7.81 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 0 - Forks: 0

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 13.8 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 1 - Forks: 2

PmMohammedRayaan/Titan-Silent-DOC-Exploit
Titan-Silent-DOC-Exploit is a tool designed to exploit vulnerabilities in Microsoft Word documents. It streamlines the process of creating silent exploits for security researchers and developers. 🛠️📄
Size: 1.95 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Koray123-debug/The-Titan-Crypter
Size: 13.7 KB - Last synced at: 23 days ago - Pushed at: 23 days ago - Stars: 1 - Forks: 0

shinyelectron/LNK-Exploit
🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher
Language: Python - Size: 63.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 17 - Forks: 5

Kramozon/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Karitosmuan/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

yxj6hk6g19/doc-exploit
doc-exploit - Main repository of thread.
Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

IgorekMarcinpano/PDF-EXPLOIT-2024
Educational purpose of showing how to inject and work with pdf exploit
Size: 2.93 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

VEN0MTOOLS/SILENT-DOC-EXPLOIT-2024
The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time.
Size: 10.7 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

karianne90litte/DOC-EXPLOIT
http://t.me/ALIENDOT
Size: 1.95 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

venomtools12/SILENT-DOC-EXPLOIT
The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time. You are able to attach it to the most e-mail providers nowadays everyone uses Microsoft Office so it gives a huge chance of success.
Size: 0 Bytes - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

fctsociety/pdf-exploit
You open a pdf but the executable file opens (FUD)
Language: Python - Size: 4.71 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 20 - Forks: 0

seleniumpdf/pdf-exploit
Adobe Pdf-exploit builder on JavaScript
Language: JavaScript - Size: 20.5 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 3 - Forks: 0

techyhub431/Silent-Office-Exploit-2024
The exploit allows you to convert EXE to .PDF, .XLS, .DOC in one click
Size: 1000 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 18 - Forks: 0

FireMachiness/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted
Language: C++ - Size: 620 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

yammydonats/doc-exploit
Size: 1000 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 0

oleDur3X/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС
Size: 5.23 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

h0llykxZ/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС
Size: 5.23 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

h1slERIA/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС
Size: 1.95 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 31 - Forks: 0

3x0rc1sk/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС
Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

H0r1zx0n/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNC,
Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 30 - Forks: 0

reecan0rx/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE
A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNC,
Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

WalterJrs/SADAS2113
Bypass Word Security One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit
Language: C++ - Size: 87.9 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 2 - Forks: 1

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted
Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Oxidation0x/Silent-Exploit
Silent Exploit
Size: 10.7 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0
