• Security tools
    • MacroPack
    • Glyptodon
      • Suggestions
      • Download
  • Links
  • Learning security
    • The human factor
    • Operating Systems
      • Windows
        • Code injection series
      • GNU Linux
    • Networks
      • Local Area Network
      • Firewalls, IDS, IPS
    • Miscellaneous
    • Malwares
    • Applications
      • Web applications
      • Java
  • Exploits
  • About us
  • Launch shellcodes and bypass Antivirus using MacroPack Pro VBA payloads

    If you have ever been frustrated with manually writing Office/VBS payloads that ends up being detected by antivirus read this post! MacroPack Pro provides multiple options and templates related... Continue reading →

    D 21 January 2021     A Emeric Nasi     C 0 messages

1 | 2 | 3

  • Advanced MacroPack payloads: XLM Injection

    How it is possible to inject and run Excel 4.0 macro in memory from a non Excel format payload (ex Word, HTA, Help files,...). How to generate using MacroPack...
    Continue reading →
    D 18 September 2020     A Emeric Nasi     C 0 messages
  • EXCEL 4.0 XLM macro in MacroPack Pro

    Excel 4.0 macro (also called XLM) have been commonly used by malicious operators these last years, it has also been analyzed and commented by several researches (red or blue)....
    Continue reading →
    D 18 September 2020     A Emeric Nasi     C 0 messages
  • Code Injection - Weaponize GhostWriting Injection

    Lets talk about this code injection technique called GhostWriting that works by manipulating the register states of the target process...
    Continue reading →
    D 2 September 2020     A Emeric Nasi     C 0 messages

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | ... | 20

Search


Most popular

1.  VNC to access Kali Linux on Raspberry Pi

2.  Bypass Defender and other thoughts on Unicode RTLO attacks

3.  Yet another sdclt UAC bypass

4.  Hacking around HTA files

5.  PE injection explained


5 random articles

1.  VNC to access Kali Linux on Raspberry Pi

2.  Build a recovery toolkit

3.  Implement hash service using JCE

4.  TVT DVR/CCTV webshell exploit

5.  How to secure Linux users


Sponsor

If you appreciate my work, you may help or reward with a contribution :)

  • ->  Paypal donation

Most recent articles
  • 13 January 2011 – Modify any Java class field using reflection.
  • 8 January 2011 – Enable securitymanager for Spring and Hibernate
  • 5 December 2010 – Linux filesystem security scans
  • 28 November 2010 – Glyptodon-1.2 release 2
  • 10 November 2010 – Implement hash service using JCE
  • 1 November 2010 – Glyptodon-1.2 release1
  • 23 October 2010 – One time passwords
  • 23 September 2010 – Iptables firewall versus nmap and hping3

1 | 2 | 3 | 4 | 5

Recent comments
  • July 2020, tim :
    « Did you import any librarys in the python script as mine doesnt appear to (...) »
  • April 2020, Nanyo :
    « After spending a while to get everything to compile the injected code (...) »
  • February 2020, ajay :
    « In the code segment for stub at line 38, the realmain() function call is (...) »
  • August 2019, Emeric Nasi :
    « Hi, I am currently writing a new series of post on injection including a (...) »

1 | 2 | 3 | 4 | 5

Latest news
Tweets by EmericNasi

2010-2021 Sevagas
Archives | Log in | Contact

RSS 2.0 twitter linkedin facebook