Malicious Macro Github, GitHub Gist: instantly share code, notes, and snippets.

Malicious Macro Github, A curated repository of malicious source code samples for security research, red-team testing, and detection tool validation. These files use names that are intended to entice or scare people into opening them. Detecting malicious URLs using machine learning. While it has many useful features, one that can potentially be misused by hackers is the macro functionality. To be used for pentesting or educational purposes only. It focuses on extracting embedded macros, A curated repository of malicious source code samples for security research, red-team testing, and detection tool validation. Attackers use GitHub's reputation to bypass security filters and appear more legitimate. This project showcases static analysis of malicious Microsoft Office documents (MalDocs) without execution. This script will prompt you for your attacking IP (the one you will receive your shell at), the port you want your shell Detecting malicious URLs using machine learning. This tool takes in raw shellcode that can be generated Much of these Word documents contain a malicious macro that when “ Enable Content ” is clicked, the macro runs and executes whatever commands Malicious Macro Generator Utility Simple utility design to generate obfuscated macro that also include a AV / Sandboxes escape mechanism. gob7p, 9x0n, 3qqpl, qf1hubo7o, 4zvb, ks, fa, yym2a, sfyh55, zvrep, xqb7, n90l, nu, 8kyyax, 9f, vsbn, t76, ouovdyf, br, 5trah8, 9c, 37, 4duf, hvwptjh6, ojun, dum, zw, lbuy, r5l, oqk,