Adepts-Of-0xCC / VBA-macro-experiments
Collection of VBA macro published in our twitter / blog
☆154Updated 2 years ago
Alternatives and similar repositories for VBA-macro-experiments:
Users that are interested in VBA-macro-experiments are comparing it to the libraries listed below
- ☆125Updated 3 years ago
- InlineExecute-Assembly is a proof of concept Beacon Object File (BOF) that allows security professionals to perform in process .NET assem…☆185Updated 3 years ago
- (kinda) Malicious Outlook Reader☆133Updated 3 years ago
- A fake AMSI Provider which can be used for persistence.☆141Updated 3 years ago
- Tool for interacting with outlook interop during red team engagements☆144Updated 3 years ago
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆213Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆234Updated 3 years ago
- Collection of beacon object files for use with Cobalt Strike to facilitate 🐚.☆174Updated 3 years ago
- Simple EDR implementation to demonstrate bypass☆163Updated 4 years ago
- Macro-Enabled Excel File Generator (.xlsm) using the EPPlus Library.☆145Updated 4 years ago
- credential dump using foreshaw technique using SeTrustedCredmanAccessPrivilege☆121Updated 3 years ago
- ☆69Updated 3 years ago
- D/Invoke port of UrbanBishop☆105Updated 4 years ago
- C# Implementation of the Hell's Gate VX Technique☆208Updated 4 years ago
- A tool for generating .NET serialized gadgets that can trigger .NET assembly load/execution when deserialized using BinaryFormatter from …☆83Updated 4 years ago
- MSBuild Without MSBuild.exe☆155Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆260Updated 3 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆87Updated 5 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆216Updated 3 years ago
- ☆147Updated 4 years ago
- A Cobalt Strike Beacon Object File (BOF) project which uses direct system calls to enumerate processes for specific loaded modules or pro…☆266Updated last year
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆69Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆121Updated 3 years ago
- NativePayload_CallBackTechniques C# Codes (Code Execution via Callback Functions Technique, without CreateThread Native API)☆114Updated last year
- Code Exec via Excel☆85Updated 7 years ago
- Start new PowerShell without etw and amsi in pure nim☆157Updated 2 years ago
- Tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) via Syswhispers2☆179Updated 2 years ago
- Managed code hooking template.☆129Updated 3 years ago
- This repository is a collection of my malicious VBA projects.☆111Updated 3 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Updated last year