From e3ba0632c563747446bc259b41a2b5be05c2f015 Mon Sep 17 00:00:00 2001 From: Meitar Moscovitz Date: Sat, 11 Mar 2017 00:37:00 -0500 Subject: [PATCH] Add wePWNise, Python tool to automate Windows/Office exploit mitigation. --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 57eec4e..7f147bd 100644 --- a/README.md +++ b/README.md @@ -221,6 +221,7 @@ A collection of awesome penetration testing resources * [Bloodhound](https://github.com/adaptivethreat/Bloodhound/wiki) - A graphical Active Directory trust relationship explorer * [Empire](https://github.com/PowerShellEmpire/Empire) - Empire is a pure PowerShell post-exploitation agent * [Fibratus](https://github.com/rabbitstack/fibratus) - Tool for exploration and tracing of the Windows kernel +* [wePWNise](https://labs.mwrinfosecurity.com/tools/wepwnise/) - Generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application control and exploit mitigation software #### Linux Utils * [Linux Exploit Suggester](https://github.com/PenturaLabs/Linux_Exploit_Suggester) - Linux Exploit Suggester; based on operating system release number.