waleedassar / VBAMacroPWDLinks
Python scripts to remove, change, and crack Office 97-2003/Office 2007/Office 2010/Office 2013 Macro Passwords
☆132Updated 4 years ago
Alternatives and similar repositories for VBAMacroPWD
Users that are interested in VBAMacroPWD are comparing it to the libraries listed below
Sorting:
- VBA Dynamic Hook dynamically analyzes VBA macros inside Office documents by hooking function calls☆149Updated 9 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆277Updated 3 years ago
- Extract embedded files and macros from office documents.☆185Updated last year
- Yet another Python library to read and write PE/PE+ files.☆78Updated 8 years ago
- Offline debugger for malware's reverse engineering☆116Updated 10 years ago
- A VBA p-code disassembler☆476Updated 4 years ago
- zer0m0n driver for cuckoo sandbox☆88Updated 9 years ago
- IDATACO IDA Pro Plugin☆47Updated 9 years ago
- Breaking the security of Microsoft's RMS☆55Updated 6 years ago
- Elevation by environment variable expansion☆65Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆148Updated 10 years ago
- ☆31Updated 9 years ago
- Cheat-Sheet with events too look out for when analysing malicious Office documents☆19Updated 7 years ago
- a collection of yara rules for binary analysis☆24Updated 8 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆170Updated 7 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 8 years ago
- Utility to retrieve the Master File Table (MFT) from a live running NTFS volume and send it to a netcat listener.☆41Updated 10 years ago
- ☆68Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 6 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Updated 8 years ago
- ☆74Updated 3 years ago
- ☆52Updated 10 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Sublime Malware Research Tool☆66Updated 10 months ago
- Using WinDBG to tap into JavaScript and help with deobfuscation and browser exploit detection☆82Updated 8 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Updated 8 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Updated 10 years ago
- Python Application to Reverse Freezing☆36Updated 9 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆130Updated 8 years ago