Pentesting Notebook
search
⌘Ctrlk
Pentesting Notebook
  • Offensive security
    • Tooling
    • Virtualisation
    • Active Directory
    • Infrastructure
    • OSEP: Checklist
    • AV Evasion
      • C# AV Evasion
      • Office AV Evasion
        • Encryption
        • VBA Stomping
        • Hiding PowerShell in VBA
        • VBA AMSI bypass
        • Simple Webcall
      • AMSI
      • Fileless Shellcode
      • Disable AV
      • In-memory execution
      • Easy reflection with Base64
    • UAC Bypass
    • Applocker
    • Initial compromise
    • Privilege Escalation
    • Persistence
    • Data Protection API
    • Windows Script Host
    • Cobalt Strike
    • MetaSploit
    • Linux
    • macOS
    • SQLMap
    • Regex / sed
    • Cracking
    • Misc.
    • Visual Studio notes
  • Generic
    • Commands
    • Web
    • Fixing Errors
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Offensive securitychevron-right
  2. AV Evasion

Office AV Evasion

Encryptionchevron-rightVBA Stompingchevron-rightHiding PowerShell in VBAchevron-rightVBA AMSI bypasschevron-rightSimple Webcallchevron-right

Last updated 2 years ago