0xm4v3rick / Extract-MacroLinks
This PS script will extract macro from Excel and Word files. Also checks the macro for suspecious code patterns Includes temporary DDE check for word documents
☆34Updated last year
Alternatives and similar repositories for Extract-Macro
Users that are interested in Extract-Macro are comparing it to the libraries listed below
Sorting:
- DLL Password Filter Implant with Exfiltration Capabilities☆138Updated 5 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Updated last year
- Windows link file (shortcuts) examiner☆68Updated last year
- ☆97Updated 4 months ago
- AdHoc solutions☆48Updated 2 years ago
- ReVBShell - Reverse VBS Shell☆83Updated 3 months ago
- ☆62Updated 5 years ago
- A tool for detecting VBA stomping.☆101Updated 3 years ago
- A simple python implementation of a BITS server.☆105Updated 3 years ago
- volatility explorer☆92Updated 5 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- SysInternals' Process Monitor filters repository - collected from various places and made up by myself. To be used for quick Behavioral a…☆70Updated 4 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆104Updated 8 years ago
- Labs setup for tests & experimentations☆26Updated 4 years ago
- PoC that manipulates Windows file times using SetFileTime() API☆63Updated 6 years ago
- A repository of example VBA stomped documents☆28Updated 6 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Updated 7 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 5 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Updated 7 years ago
- A simple XLL, showing how to create an XLL from scratch.☆49Updated 10 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago
- Code Exec via Excel☆88Updated 8 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆70Updated 4 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65Updated 6 years ago
- ☆60Updated 5 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Updated 3 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Updated 10 months ago
- Presentation material presented by Outflank team members at public events.☆192Updated 3 months ago