EvilClippy
Malware generator
An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
2k stars
91 watching
398 forks
Language: C#
last commit: 12 months ago
Linked from 1 awesome list
excelmacromalwarems-officepcodestompingvbaword
Related projects:
Repository | Description | Stars |
---|---|---|
michaelweber/macrome | A tool used to create and manipulate Excel documents containing malicious macros. | 514 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 275 |
infosecn1nja/maliciousmacromsbuild | Generates malicious macros to bypass application whitelisting and execute powershell or shellcode via MSBuild. | 495 |
weisong-ucr/mab-malware | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
mr-un1k0d3r/powerlessshell | A tool for generating malware payloads using MSBuild and PowerShell, allowing for conditional execution based on user domain or registry conditions. | 1,480 |
outflanknl/c2-tool-collection | Tools for exploiting vulnerabilities in Windows systems and gathering information about networked computers. | 1,155 |
outflanknl/excel4-dcom | A method for injecting malicious code into Excel 4.0 macros via DCOM for lateral movement in Windows systems | 322 |
outflanknl/spray-ad | Automates an Active Directory password spraying attack to identify weak or guessable passwords | 426 |
pushpenderindia/sinister | A tool that generates and deploys a keylogger malware that sends keystrokes and device information via email to an attacker. | 448 |
decalage2/vipermonkey | An emulation engine designed to analyze and deobfuscate malicious VBA macros in Microsoft Office files. | 1,058 |
outflanknl/inlinewhispers | Tool to generate inline assembly code for direct system calls in COBalt Strike's Beacon Object Files (BOF) | 308 |
kaganisildak/malwarescarecrow | A tool designed to make physical devices detectable by malware and create a deceptive environment for evasion techniques. | 382 |
misterch0c/malsploitbase | A repository of publicly available malware exploits targeting specific infrastructure. | 537 |
bonnetn/vba-obfuscator | A tool that obfuscates Visual Basic code to evade signature scans from Antivirus software | 150 |
jpcertcc/malconfscan | Tools to extract configuration data from known malware samples in memory images. | 483 |