• Security tools
    • MacroPack
    • Glyptodon
      • Suggestions
      • Download
  • Links
  • Learning security
    • The human factor
    • Operating Systems
      • Windows
        • Code injection series
      • GNU Linux
    • Networks
      • Local Area Network
      • Firewalls, IDS, IPS
    • Miscellaneous
    • Malwares
    • Applications
      • Web applications
      • Java
  • Exploits
  • About us
  • RedTeam With OneNote

    OneNote is one of the Office suite components which is often overlooked when RedTeaming. Though OneNote cannot execute VBA Macros, it has an important potential for phishing as an initial... Continue reading →

    D 9 August 2022     A Emeric Nasi     C 0 messages

1 | 2 | 3

  • RedTeam With Publisher

    Microsoft Publisher is another tool of the Office suite which is often ignored when RedTeaming. This is a basic review of the great potential Publisher has for Offensive...
    Continue reading →
    D 28 April 2022     A Emeric Nasi     C 0 messages
  • MSDT DLL Hijack UAC bypass

    UAC Bypass via DLL hijacking of Microsoft Support Diagnostic Tool (MSDT). The UAC bypass method described here is based on DLL hijacking which happens when loading the...
    Continue reading →
    D 2 February 2022     A Emeric Nasi     C 0 messages
  • Hide HTA window for RedTeam

    Short post to explain how to create a stealthy HTA file running without any window or taskbar mention. This can be used combined withe other techniques to create advanced...
    Continue reading →
    D 15 July 2021     A Emeric Nasi     C 0 messages

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ... | 21

Search


Most popular

1.  RedTeam With OneNote

2.  Hacking around HTA files

3.  VNC to access Kali Linux on Raspberry Pi

4.  Digging passwords in Linux swap

5.  MSDT DLL Hijack UAC bypass


5 random articles

1.  Hide HTA window for RedTeam

2.  Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads

3.  Modify any Java class field using reflection.

4.  Bypass Antivirus Dynamic Analysis

5.  POSIX file capabilities, the dark side


Sponsor

If you appreciate my work, you may help or reward with a contribution :)

  • ->  Paypal donation

Most recent articles
  • 9 August – RedTeam With OneNote
  • 28 April – RedTeam With Publisher
  • 2 February – MSDT DLL Hijack UAC bypass
  • 15 July 2021 – Hide HTA window for RedTeam
  • 21 January 2021 – Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads
  • 18 September 2020 – Advanced MacroPack payloads: XLM Injection
  • 18 September 2020 – EXCEL 4.0 XLM macro in MacroPack Pro
  • 2 September 2020 – Code Injection - Weaponize GhostWriting Injection

1 | 2 | 3 | 4 | 5

Recent comments
  • April 2020, Nanyo :
    « After spending a while to get everything to compile the injected code (...) »
  • February 2020, ajay :
    « In the code segment for stub at line 38, the realmain() function call is (...) »
  • August 2019, Emeric Nasi :
    « Hi, I am currently writing a new series of post on injection including a (...) »
  • August 2019, Jeff Brower :
    « Sevagas ... ok I figured out the PEB byte check, looks like I could simply (...) »

1 | 2 | 3 | 4 | 5

Latest news
Tweets by EmericNasi

2010-2022 Sevagas
Archives | Log in | Contact

RSS 2.0 twitter linkedin facebook