ch4meleon / vba_obfuscatorLinks
VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing in my work.
☆32Updated 5 years ago
Alternatives and similar repositories for vba_obfuscator
Users that are interested in vba_obfuscator are comparing it to the libraries listed below
Sorting:
- A simple XLL, showing how to create an XLL from scratch.☆50Updated 10 years ago
- This repository is a collection of my malicious VBA projects.☆119Updated 4 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆39Updated 5 years ago
- Python script to obfuscate VBA (Virtual Basic for Applications) macros☆61Updated 6 years ago
- ☆132Updated 4 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆67Updated 5 years ago
- VBA Macro obfuscator☆13Updated 5 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 6 years ago
- Running .NET from VBA☆149Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- Managed code hooking template.☆134Updated 4 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆148Updated 4 years ago
- Process Dumper written entirely in VBA.☆25Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆60Updated 4 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆160Updated 3 years ago
- Execute .Net assemblies using Rundll32.exe☆114Updated 4 years ago
- ☆21Updated 6 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Updated 5 years ago
- C++ function that will automagically unhook a specified Windows API☆62Updated 5 years ago
- Bypass AMSI and Defender using Ordinal Values☆41Updated 5 years ago
- Assembly HellGate implementation that directly calls Windows System Calls and displays the PPID of the explorer.exe process☆107Updated 2 years ago
- ☆48Updated 5 years ago
- My doodles as I learn C#☆76Updated 5 years ago
- ☆19Updated 5 years ago
- DInvisibleRegistry☆82Updated 5 years ago
- Suite of Shellcode Running Utilities☆114Updated 6 years ago
- Upsilon execute shellcode with syscalls - no API like NtProtectVirtualMemory is used☆92Updated 4 years ago
- ☆26Updated 4 years ago