• Security tools
    • MacroPack
    • Glyptodon
      • Suggestions
      • Download
  • Links
  • Learning security
    • The human factor
    • Operating Systems
      • Windows
        • Code injection series
      • GNU Linux
    • Networks
      • Local Area Network
      • Firewalls, IDS, IPS
    • Miscellaneous
    • Malwares
    • Applications
      • Web applications
      • Java
  • Exploits
  • About us
  • Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads

    If you have ever been frustrated with manually writing Office/VBS payloads that ends up being detected by antivirus read this post! MacroPack Pro provides multiple options and templates related... Continue reading →

    D 21 January 2021     A Emeric Nasi     C 0 messages

1 | 2 | 3

  • Advanced MacroPack payloads: XLM Injection

    How it is possible to inject and run Excel 4.0 macro in memory from a non Excel format payload (ex Word, HTA, Help files,...). How to generate using MacroPack...
    Continue reading →
    D 18 September 2020     A Emeric Nasi     C 0 messages
  • EXCEL 4.0 XLM macro in MacroPack Pro

    Excel 4.0 macro (also called XLM) have been commonly used by malicious operators these last years, it has also been analyzed and commented by several researches (red or blue)....
    Continue reading →
    D 18 September 2020     A Emeric Nasi     C 0 messages
  • Code Injection - Weaponize GhostWriting Injection

    Lets talk about this code injection technique called GhostWriting that works by manipulating the register states of the target process...
    Continue reading →
    D 2 September 2020     A Emeric Nasi     C 0 messages

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ... | 20

Search


Most popular

1.  VNC to access Kali Linux on Raspberry Pi

2.  Bypass Defender and other thoughts on Unicode RTLO attacks

3.  Yet another sdclt UAC bypass

4.  Hacking around HTA files

5.  PE injection explained


5 random articles

1.  VNC to access Kali Linux on Raspberry Pi

2.  Build a recovery toolkit

3.  Implement hash service using JCE

4.  TVT DVR/CCTV webshell exploit

5.  How to secure Linux users


Sponsor

If you appreciate my work, you may help or reward with a contribution :)

  • ->  Paypal donation

Most recent articles
  • 21 January – Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
  • 18 September 2020 – Advanced MacroPack payloads: XLM Injection
  • 18 September 2020 – EXCEL 4.0 XLM macro in MacroPack Pro
  • 2 September 2020 – Code Injection - Weaponize GhostWriting Injection
  • 25 May 2020 – Bypass Defender and other thoughts on Unicode RTLO attacks
  • 1 December 2019 – Code Injection - Disable Dynamic Code Mitigation (ACG)
  • 1 December 2019 – Code Injection - Exploit WNF callback
  • 5 September 2019 – Code Injection - Bypass start address protection

1 | 2 | 3 | 4 | 5

Recent comments
  • August 2019, Jeff Brower :
    « Sevagas ... ok I figured out the PEB byte check, looks like I could simply (...) »
  • August 2019, Jeff Brower :
    « Sevagas- Your approach is great, perspective from both viewpoints. "know (...) »
  • July 2019, s1nisteR :
    « Built the program and started it up. It shows the message and everything (...) »
  • June 2019, kirthi :
    « how to change the order of the private data variable? »

1 | 2 | 3 | 4 | 5

Latest news
Tweets by EmericNasi

2010-2021 Sevagas
Archives | Log in | Contact

RSS 2.0 twitter linkedin facebook