GitHub topics: doc-exploit-fud
shinyelectron/LNK-Exploit
πAn lnk exploit (fake txt) for starting files with other extensions silently. Works on Windows 7 or higher
Language: Python - Size: 63.5 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 17 - Forks: 5

VENOMTOOLSOP/SILENT-DOC-EXPLOIT-2025
The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time.
Size: 0 Bytes - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

VEN0MTOOLS/SILENT-DOC-EXPLOIT-2024
The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time.
Size: 10.7 KB - Last synced at: 9 months ago - Pushed at: 9 months ago - Stars: 0 - Forks: 0

shiny-laboratory/Lnk-exploit
πAn lnk exploit (fake pdf file) for starting files with other extensions silently. Works on Windows 7 or higher
Size: 16.6 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 14 - Forks: 2

karianne90litte/DOC-EXPLOIT
http://t.me/ALIENDOT
Size: 1.95 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 2 - Forks: 0

venomtools12/SILENT-DOC-EXPLOIT
The exploit allows you to convert EXE to .DOC its coded 100% from scratch and used by private method to assure a great stability and lasting FUD time. You are able to attach it to the most e-mail providers nowadays everyone uses Microsoft Office so it gives a huge chance of success.
Size: 0 Bytes - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

yammydonats/doc-exploit
Size: 1000 Bytes - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 2 - Forks: 0

WalterJrs/SADAS2113
Bypass Word Security One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit
Language: C++ - Size: 87.9 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 2 - Forks: 1

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

Blacking000/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
One of the most complex tasks for the cyber security expert is to ensure their malicious code goes detected by antivirus and achieves its goal. For this, they have invested a lot on more complex infection processes, going beyond the traditional Exploit PDF and using techniques where the malicious payload is hidden in encrypted
Language: C++ - Size: 675 KB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 10 - Forks: 0
