ch4meleon / vba_obfuscatorLinks
VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing in my work.
☆32Updated 5 years ago
Alternatives and similar repositories for vba_obfuscator
Users that are interested in vba_obfuscator are comparing it to the libraries listed below
Sorting:
- VBA Macro obfuscator☆13Updated 4 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆137Updated 3 years ago
- This repository is a collection of my malicious VBA projects.☆115Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Inject Encrypted Commands Into EMF Shapes for C2 In VBA / Office Malware☆38Updated 5 years ago
- Python script to obfuscate VBA (Virtual Basic for Applications) macros☆58Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- AmsiHook is a project I created to figure out a bypass to AMSI via function hooking.☆66Updated 5 years ago
- A simple XLL, showing how to create an XLL from scratch.☆48Updated 9 years ago
- ☆131Updated 4 years ago
- Collection of VBA macro published in our twitter / blog☆158Updated 2 years ago
- ☆48Updated 4 years ago
- Bypass AMSI and Defender using Ordinal Values☆42Updated 5 years ago
- Running .NET from VBA☆147Updated 2 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- ☆19Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆58Updated 3 years ago
- C++ implant that interfaces with a SK8PARK server☆49Updated 4 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago
- ☆20Updated 5 years ago
- Process Dumper written entirely in VBA.☆24Updated 4 years ago
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Updated 5 years ago
- Simple .NET assembly to interact with services.☆41Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- External C2 Using IE COM Objects☆100Updated 6 years ago
- My doodles as I learn C#☆78Updated 4 years ago
- Hardened Proof of Concept of D/Invoke Process Injection malware☆42Updated 5 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- ☆46Updated 3 years ago