An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: doc-exploit

Vandan8123/The-Titan-Crypter

The-Titan-Crypter is a powerful tool designed to encrypt and obfuscate executable files, enhancing their security against detection. It provides users with a straightforward interface to customize settings and improve the stealth of their applications.

Size: 7.81 KB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 0 - Forks: 0

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 13.8 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 1 - Forks: 2

PmMohammedRayaan/Titan-Silent-DOC-Exploit

Titan-Silent-DOC-Exploit is a tool designed to exploit vulnerabilities in Microsoft Word documents. It streamlines the process of creating silent exploits for security researchers and developers. 🛠️📄

Size: 1.95 KB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Koray123-debug/The-Titan-Crypter

Size: 13.7 KB - Last synced at: 23 days ago - Pushed at: 23 days ago - Stars: 1 - Forks: 0

shinyelectron/LNK-Exploit

🌐An lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher

Language: Python - Size: 63.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 17 - Forks: 5

Kramozon/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Karitosmuan/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 13 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

yxj6hk6g19/doc-exploit

doc-exploit - Main repository of thread.

Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 1 - Forks: 0

IgorekMarcinpano/PDF-EXPLOIT-2024

Educational purpose of showing how to inject and work with pdf exploit

Size: 2.93 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

VEN0MTOOLS/SILENT-DOC-EXPLOIT-2024

The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time.

Size: 10.7 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 0 - Forks: 0

karianne90litte/DOC-EXPLOIT

http://t.me/ALIENDOT

Size: 1.95 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

venomtools12/SILENT-DOC-EXPLOIT

The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time. You are able to attach it to the most e-mail providers nowadays everyone uses Microsoft Office so it gives a huge chance of success.

Size: 0 Bytes - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

fctsociety/pdf-exploit

You open a pdf but the executable file opens (FUD)

Language: Python - Size: 4.71 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 20 - Forks: 0

seleniumpdf/pdf-exploit

Adobe Pdf-exploit builder on JavaScript

Language: JavaScript - Size: 20.5 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 3 - Forks: 0

techyhub431/Silent-Office-Exploit-2024

The exploit allows you to convert EXE to .PDF, .XLS, .DOC in one click

Size: 1000 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 18 - Forks: 0

FireMachiness/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

Language: C++ - Size: 620 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

yammydonats/doc-exploit

Size: 1000 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 0

oleDur3X/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС

Size: 5.23 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

h0llykxZ/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС

Size: 5.23 MB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

h1slERIA/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС

Size: 1.95 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 31 - Forks: 0

3x0rc1sk/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNС

Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

H0r1zx0n/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNC,

Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 30 - Forks: 0

reecan0rx/VENOMRAT-6.0.3-CRACKED-HVNC-STEALER-GRABBER-SOURCE-CODE

A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You will be able to test your users by having direct RAT access to their systems, and then deploy advanced HVNC,

Size: 0 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 1 - Forks: 0

WalterJrs/SADAS2113

Bypass Word Security One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit

Language: C++ - Size: 87.9 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 2 - Forks: 1

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.

Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve

One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted

Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0

Oxidation0x/Silent-Exploit

Silent Exploit

Size: 10.7 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 2 - Forks: 0

Related Keywords
doc-exploit 27 pdf-exploit 11 exploit 9 doc-exploit-fud 8 word-exploit 8 crypter 8 stealer 7 file-grabber 6 venomrat-source 6 venomratcracked 6 exploit-development 6 exploitation 6 exploitation-framework 6 venomrathvnc 6 venomratstealer 6 hvnc-rat 6 keylogger 6 password-stealer 6 rat 6 doc-exploits 6 remote-control 6 remote-desktop 6 reverse-proxy 6 pdf-exploit-fud 6 venom-rat 6 hvnc 6 venomrat 6 remote-access 6 cve 5 exploit-database 5 fud-crypter 5 cve-scanning 5 exploit-exercises 4 silent-exploit 4 exploits 4 slient-exploit-builder 4 exploit-code 4 doc 4 fud-rat 3 doc-exploit-2024 3 pdf-exploit-builder 3 fud 3 office-365 3 office 3 exploit-kit 3 doc-payloads 3 doc-malware 3 doc-cve 3 doc-builder 3 cve-2025-44228 3 silent-doc-exploit 3 pdf-exploits 3 defender-bypass 3 silent-pdf-exploit 3 av-bypass 3 exploiting 2 fud-crypter-2024 2 fud-doc-exploit 2 fud-exploit 2 cvent-sast 2 cve-search 2 cve-2021-44228 2 silent-doc-exploit-builder 2 doc-expiration 2 docexploit 2 silent-word-exploit 2 office-exploit 2 crypter-fud 2 bypass-antivirus 2 bypass-windows-defender 2 api-hooking 2 av-evasion 2 runpe 2 obfuscator 2 kernel 2 edr-evasion 2 dll-injector 2 wallet 1 rar-exploit 1 pdfexploitbuilder2024 1 pdfexploitbuilder 1 pdfexploit 1 pdf-generation 1 pdf 1 grabber 1 fud-stealer 1 fud-backdoor 1 builder 1 0day-exploit 1 hacker-exploit 1 microsoft-office-exploit 1 silent-office-exploit 1 silent-xls-exploit 1 xls-exploit 1 zero-day-exploit 1 silent-pdf 1 silent-exploit-2023 1 silent-doc 1 cves 1 silent 1