Twitter | Pretraživanje | |
Pretraživanje Osvježi
John Lambert 30. sij
Malware that just quits? I think there's more to the formula in this maldoc. reveals all cc/ 🔗
Reply Retweet Označi sa "sviđa mi se"
Matteo Lodi 27. sij
Thanks ! Now you can use to detect this new trick used by recent downloaders!
Reply Retweet Označi sa "sviđa mi se"
Decalage 27. sij
olevba and mraptor now detect the new "_OnConnecting" trigger used in some recent malware, thanks to
Reply Retweet Označi sa "sviđa mi se"
V 20. pro
Seriously Google ? Seriously Microsoft ? a malware !!? The tests samples are... tests !!!
Reply Retweet Označi sa "sviđa mi se"
CinCan project 19. pro
♫ On the 19th day of Christmas Philippe Lagadec sent to me oletools, the many ways of peeking into malicious OLE file ♫ t♫ We’re very grateful about the tool! Read the blog:
Reply Retweet Označi sa "sviđa mi se"
Decalage 5. pro
Final slides of my presentation yesterday at Black Hat Europe 2019, about malicious VBA macros and recent advances in the attack & defence sides: Featuring /olevba, ViperMonkey, MacroRaptor, EvilClippy
Reply Retweet Označi sa "sviđa mi se"
Decalage 4. pro
0.55 is finally out, just in time for ! Main changes: olevba += SLK file parser and XLM macro extraction, VBA stomping detection More info: How to install/update: pip install -U oletools
Reply Retweet Označi sa "sviđa mi se"
Paul_sec 27. ruj
I’ve written a guide on how to deobfuscate malicious macros with open source tools. Check it out!
Reply Retweet Označi sa "sviđa mi se"
Decalage 26. ruj
In December I'll give a presentation at BlackHat Europe in London about malicious VBA Macros, advanced techniques and the recent/upcoming improvements in my tools to address them ( olevba, mraptor, ViperMonkey)
Reply Retweet Označi sa "sviđa mi se"
Decalage 19. ruj
7 years of development summarized in a strange 7 minutes video found on youtube by accident... Thanks to all the contributors who are helping me on this project!
Reply Retweet Označi sa "sviđa mi se"
Decalage 27. svi
The new 0.55.dev1 integrates with pcodedmp to display VBA P-code when using the option --pcode. The next step will be to detect VBA stomping to counter EvilClippy and adb! cc Install:
Reply Retweet Označi sa "sviđa mi se"
Marcus LaFerrera 20. pro 2018.
Thanks to and , v2 now has several plugins leveraging the package.
Reply Retweet Označi sa "sviđa mi se"
Decalage 9. lis 2018.
0.54dev2: olevba now detects and shows backspace characters that may be used to hide VBA code on the console, as demonstrated by and at . More info: - Install:
Reply Retweet Označi sa "sviđa mi se"
Decalage 14. ruj 2018.
TIL that some people are brave enough to run ViperMonkey in production, to automate the extraction of obfuscated payloads and URLs from VBA macros. This would not be possible without all the contributions from .
Reply Retweet Označi sa "sviđa mi se"
Paul Cimino 23. srp 2018.
My first blog post is up. Extracting macros in Word documents using oletools.
Reply Retweet Označi sa "sviđa mi se"
Malwrologist 18. svi 2018.
New release of inspired me to investigate capability in . Awesome updt. But is it only about cmd? No. You can run any cmd with . In this example, I show how to use to run notepad via . limitation: len(cmd name) <= 8 chars
Reply Retweet Označi sa "sviđa mi se"
Decalage 26. srp 2017.
FLARE VM: turn a Windows VM into a malware analysis platform with lots of tools - including
Reply Retweet Označi sa "sviđa mi se"
Decalage 10. svi 2017.
Odgovor korisniku/ci @decalage2
The cheat sheet is available on the github repository in DOCX and PDF formats:
Reply Retweet Označi sa "sviđa mi se"
Decalage 11. tra 2017.
rtfobj (dev version): added detection of the MS Word "OLE2Link" vulnerability cc
Reply Retweet Označi sa "sviđa mi se"
John Lambert 8. tra 2017.
Hey is there a way to dump document variables (not properties) with ? They are stored in the 1Table stream.
Reply Retweet Označi sa "sviđa mi se"