EvilClippy
Malware generator
An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
2k stars
91 watching
396 forks
Language: C#
last commit: 11 months ago
Linked from 1 awesome list
excelmacromalwarems-officepcodestompingvbaword
Related projects:
Repository | Description | Stars |
---|---|---|
michaelweber/macrome | A tool used to create and manipulate Excel documents containing malicious macros. | 513 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
infosecn1nja/maliciousmacromsbuild | Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 494 |
weisong-ucr/mab-malware | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 40 |
mr-un1k0d3r/powerlessshell | A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,474 |
outflanknl/c2-tool-collection | Tools for exploiting vulnerabilities in Windows systems and gathering information about networked computers. | 1,143 |
outflanknl/excel4-dcom | A method for injecting malicious code into Excel 4.0 macros via DCOM for lateral movement in Windows systems | 321 |
outflanknl/spray-ad | Automates an Active Directory password spraying attack to identify weak or guessable passwords | 425 |
pushpenderindia/sinister | A tool that generates and deploys a keylogger malware that sends keystrokes and device information via email to an attacker. | 447 |
decalage2/vipermonkey | An emulation engine designed to analyze and deobfuscate malicious VBA macros in Microsoft Office files. | 1,054 |
outflanknl/inlinewhispers | Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
kaganisildak/malwarescarecrow | A tool designed to make physical devices detectable by malware and create a deceptive environment for evasion techniques. | 379 |
misterch0c/malsploitbase | A repository of publicly available malware exploits targeting specific infrastructure. | 538 |
bonnetn/vba-obfuscator | A tool to protect VBA macros by obfuscating their code to evade antivirus signatures | 150 |
jpcertcc/malconfscan | Tools to extract configuration data from known malware samples in memory images. | 485 |