1. WordstealThis script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does not keep responsibility for any illegal action you do.
2. Dns PersistDNS-Persist is a post-exploitation agent which uses DNS for command and control.
4. Dropboxc2cDropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
6. Browser C2Post Exploitation agent which uses a browser to do C2 operations.
7. Cve 2017 11882 MetasploitThis is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.
8. Ravenraven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin.
9. RdpthiefExtracting Clear Text Passwords from mstsc.exe using API Hooking.
10. Iis RaidA native backdoor module for Microsoft IIS (Internet Information Services)