waleedassar / VBAMacroPWDLinks
Python scripts to remove, change, and crack Office 97-2003/Office 2007/Office 2010/Office 2013 Macro Passwords
☆132Updated 4 years ago
Alternatives and similar repositories for VBAMacroPWD
Users that are interested in VBAMacroPWD are comparing it to the libraries listed below
Sorting:
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆149Updated 9 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆278Updated 3 years ago
- A Generic Windows Memory Scraping Tool☆71Updated 8 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Updated 7 years ago
- Extract embedded files and macros from office documents.☆186Updated last year
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- ☆120Updated 9 years ago
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆100Updated 6 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆148Updated 10 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆106Updated 5 years ago
- ☆35Updated 8 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- ☆165Updated 8 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆93Updated 10 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Offline debugger for malware's reverse engineering☆116Updated 10 years ago
- PyAna - Analyzing the Windows shellcode☆248Updated 9 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Updated 9 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Updated 6 years ago
- ☆31Updated 9 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- ☆46Updated 8 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆105Updated 4 years ago