Excel Macro Powershell Github

5MinuteBI - Helping Create Data Power Users, 5 Minutes at a Time

5MinuteBI - Helping Create Data Power Users, 5 Minutes at a Time

Read more
Technical Guide for Insider Cyber Attacks - Bank Security

Technical Guide for Insider Cyber Attacks - Bank Security

Read more
0axx3ss - @0axx3ss Download Twitter MP4 Videos and Browse

0axx3ss - @0axx3ss Download Twitter MP4 Videos and Browse

Read more
Another Forensics Blog

Another Forensics Blog

Read more
d uijn nl | that's me!

d uijn nl | that's me!

Read more
Oto Gonderici' Excel formula injections target Turkish

Oto Gonderici' Excel formula injections target Turkish

Read more
The Macro Evolution: Bypassing Gmail's Virus Filter and

The Macro Evolution: Bypassing Gmail's Virus Filter and

Read more
Creating Realistic Test User Accounts in Active Directory

Creating Realistic Test User Accounts in Active Directory

Read more
Phishing: OLE + LNK - Red Teaming Experiments

Phishing: OLE + LNK - Red Teaming Experiments

Read more
Breaking Dridex Malware With Excel Macro Password Exploit

Breaking Dridex Malware With Excel Macro Password Exploit

Read more
PowerShell | Penetration Testing Lab | Page 2

PowerShell | Penetration Testing Lab | Page 2

Read more
PowerShell for Cyber Warriors - Bsides Knoxville 2016

PowerShell for Cyber Warriors - Bsides Knoxville 2016

Read more
Migrating to SharePoint Online? Get this ULTIMATE checklist

Migrating to SharePoint Online? Get this ULTIMATE checklist

Read more
XLS (Excel) and DOC (Word) Macro Payloads Using Veil Evasion

XLS (Excel) and DOC (Word) Macro Payloads Using Veil Evasion

Read more
Testing Top MITRE ATT&CK Techniques: PowerShell, Scripting

Testing Top MITRE ATT&CK Techniques: PowerShell, Scripting

Read more
PowerShell for Cyber Warriors - Bsides Knoxville 2016

PowerShell for Cyber Warriors - Bsides Knoxville 2016

Read more
Daniel Bohannon

Daniel Bohannon

Read more
김진욱 on Twitter:

김진욱 on Twitter: "Excel4-DCOM PowerShell and Cobalt Strike

Read more
Lateral Movement using Excel Application and DCOM - Posts By

Lateral Movement using Excel Application and DCOM - Posts By

Read more
How to Create, Delete, Edit GitHub Gists using Notepad++

How to Create, Delete, Edit GitHub Gists using Notepad++

Read more
Analyzing Malicious Documents Cheat Sheet

Analyzing Malicious Documents Cheat Sheet

Read more
A dive into Turla PowerShell usage | WeLiveSecurity

A dive into Turla PowerShell usage | WeLiveSecurity

Read more
RWMC, un

RWMC, un "Mimikatz" en powershell autosuficiente para

Read more
Excel Json Parser

Excel Json Parser

Read more
PowerShell - Who Reports to Whom? (Active Directory

PowerShell - Who Reports to Whom? (Active Directory

Read more
Magic Unicorn: Ataque y Explotación Downgrade de PowerShell

Magic Unicorn: Ataque y Explotación Downgrade de PowerShell

Read more
Tools to extract VBA Macro source code from MS Office

Tools to extract VBA Macro source code from MS Office

Read more
Offensive and Defensive PowerShell - II

Offensive and Defensive PowerShell - II

Read more
Advanced PowerShell Techniques using Magic Unicorn

Advanced PowerShell Techniques using Magic Unicorn

Read more
Stan Hegt & Pieter Ceelen BlackHat Asia, March 2019

Stan Hegt & Pieter Ceelen BlackHat Asia, March 2019

Read more
Oto Gonderici' Excel formula injections target Turkish

Oto Gonderici' Excel formula injections target Turkish

Read more
New Ursnif Variant Targets Japan Packed with New Features

New Ursnif Variant Targets Japan Packed with New Features

Read more
The Dark Side of PowerShell by George Dobrea

The Dark Side of PowerShell by George Dobrea

Read more
7 Tools For Malicious Document Creation

7 Tools For Malicious Document Creation

Read more
Oto Gonderici' Excel formula injections target Turkish

Oto Gonderici' Excel formula injections target Turkish

Read more
New malware in old Excel skins - Avira Blog

New malware in old Excel skins - Avira Blog

Read more
Accelerating Excel with Microsoft HPC Pack : Building VBA

Accelerating Excel with Microsoft HPC Pack : Building VBA

Read more
7 Tools For Malicious Document Creation

7 Tools For Malicious Document Creation

Read more
Powershell Empire Stagers 1: Phishing with an Office Macro

Powershell Empire Stagers 1: Phishing with an Office Macro

Read more
PowerShell for Cyber Warriors - Bsides Knoxville 2016

PowerShell for Cyber Warriors - Bsides Knoxville 2016

Read more
hacker-playbook-3 2

hacker-playbook-3 2

Read more
Un informático en el lado del mal: ibombshell 0 0 1b en

Un informático en el lado del mal: ibombshell 0 0 1b en

Read more
Koadic: LoL Malware Meets Python-Based Command and Control

Koadic: LoL Malware Meets Python-Based Command and Control

Read more
macro_pack - Tool Used To Automatize Obfuscation And

macro_pack - Tool Used To Automatize Obfuscation And

Read more
Scott Hanselman

Scott Hanselman

Read more
Automated Malware Analysis Report for evildoc docm

Automated Malware Analysis Report for evildoc docm

Read more
How to write to an excel file and send email - Alteryx Community

How to write to an excel file and send email - Alteryx Community

Read more
Data Cornering - Journey in work with data

Data Cornering - Journey in work with data

Read more
John Lambert on Twitter:

John Lambert on Twitter: "Weak password list? This XLS macro

Read more
Bypass Windows Defender Attack Surface Reduction

Bypass Windows Defender Attack Surface Reduction

Read more
Find Data in Excel Using PowerShell -- Microsoft Certified

Find Data in Excel Using PowerShell -- Microsoft Certified

Read more
New malware in old Excel skins - Avira Blog

New malware in old Excel skins - Avira Blog

Read more
Microsoft Word File Spreads Malware Targeting Both Apple Mac

Microsoft Word File Spreads Malware Targeting Both Apple Mac

Read more
Hack Remote PC using Microsoft Office Files (Macro Payloads)

Hack Remote PC using Microsoft Office Files (Macro Payloads)

Read more
Magic Unicorn: Ataque y Explotación Downgrade de PowerShell

Magic Unicorn: Ataque y Explotación Downgrade de PowerShell

Read more
0axx3ss - @0axx3ss Download Twitter MP4 Videos and Browse

0axx3ss - @0axx3ss Download Twitter MP4 Videos and Browse

Read more
Kantu Open-Source Selenium IDE plus additional features

Kantu Open-Source Selenium IDE plus additional features

Read more
Hunting through Log Data with Excel

Hunting through Log Data with Excel

Read more
How to Automatically Uninstall All Previous Office Versions

How to Automatically Uninstall All Previous Office Versions

Read more
Securing Windows Workstations: Developing a Secure Baseline

Securing Windows Workstations: Developing a Secure Baseline

Read more
Offensive and Defensive PowerShell - II

Offensive and Defensive PowerShell - II

Read more
Run Command - Macro - Powershell Script for each r

Run Command - Macro - Powershell Script for each r

Read more
MuddyWater Operations in Lebanon and Oman

MuddyWater Operations in Lebanon and Oman

Read more
The GDPR Playbook: Discover, Plan, and Act on the Upcoming

The GDPR Playbook: Discover, Plan, and Act on the Upcoming

Read more
Continuous Delivery Learnings, Thoughts, and Techniques

Continuous Delivery Learnings, Thoughts, and Techniques

Read more
Technology Partners Supporting GitLab | GitLab

Technology Partners Supporting GitLab | GitLab

Read more
Office Add-ins with Visual Studio Code

Office Add-ins with Visual Studio Code

Read more
1  Register a Domain Name and Set Up Child Nameservers

1 Register a Domain Name and Set Up Child Nameservers

Read more
Powershell Empire - Macro - Offensive Security

Powershell Empire - Macro - Offensive Security

Read more
Enigma0x3's Generate Macro Powershell Script Carnal0wnage

Enigma0x3's Generate Macro Powershell Script Carnal0wnage

Read more
Import / Export Excel to DataGridView from Windows Forms

Import / Export Excel to DataGridView from Windows Forms

Read more
Covering the global threat landscape

Covering the global threat landscape

Read more
PowerDrive: Accurate De-obfuscation and Analysis of

PowerDrive: Accurate De-obfuscation and Analysis of

Read more
PSExcel: Excel automation without Excel – Rambling Cookie

PSExcel: Excel automation without Excel – Rambling Cookie

Read more
PowerShell | Penetration Testing Lab | Page 2

PowerShell | Penetration Testing Lab | Page 2

Read more
MuddyWater Operations in Lebanon and Oman

MuddyWater Operations in Lebanon and Oman

Read more
Luckystrike: An Evil Office Document Generator  — #_shellntel

Luckystrike: An Evil Office Document Generator — #_shellntel

Read more
To VBA and beyond - building a RESTful backend using plain

To VBA and beyond - building a RESTful backend using plain

Read more
GitHub - dfinke/ImportExcel: PowerShell module to import

GitHub - dfinke/ImportExcel: PowerShell module to import

Read more
1  Register a Domain Name and Set Up Child Nameservers

1 Register a Domain Name and Set Up Child Nameservers

Read more
How to create qr code based on cell value in Excel?

How to create qr code based on cell value in Excel?

Read more
oletools - python tools to analyze OLE and MS Office files

oletools - python tools to analyze OLE and MS Office files

Read more
奇安信威胁情报中心

奇安信威胁情报中心

Read more
PowerShell with Microsoft Excel Macro - Domain of Azrael

PowerShell with Microsoft Excel Macro - Domain of Azrael

Read more
Import Containers for Discovery Methods in ConfigMgr with

Import Containers for Discovery Methods in ConfigMgr with

Read more
Luckystrike: An Evil Office Document Generator  — #_shellntel

Luckystrike: An Evil Office Document Generator — #_shellntel

Read more
Command and Control using Powershell and your favorite

Command and Control using Powershell and your favorite

Read more
Powershell Web Framework

Powershell Web Framework

Read more
Linux Check File For Windows Line Endings

Linux Check File For Windows Line Endings

Read more
PowerShell Downgrade Attack: Unicorn

PowerShell Downgrade Attack: Unicorn

Read more
Undetectable C# & C++ Reverse Shells - Bank Security - Medium

Undetectable C# & C++ Reverse Shells - Bank Security - Medium

Read more
Deobfuscating VBA & PowerShell Scripts of an Emotet Trojan

Deobfuscating VBA & PowerShell Scripts of an Emotet Trojan

Read more
The GDPR Playbook: Discover, Plan, and Act on the Upcoming

The GDPR Playbook: Discover, Plan, and Act on the Upcoming

Read more
PowerShell Downgrade Attack: Unicorn

PowerShell Downgrade Attack: Unicorn

Read more
Pentesting with PowerShell in six steps - Pentest e Forense

Pentesting with PowerShell in six steps - Pentest e Forense

Read more
Untitled

Untitled

Read more
Client side attacks using PowerShell

Client side attacks using PowerShell

Read more
Cyber Expert Blog | Bitdam Advanced Threat Protection

Cyber Expert Blog | Bitdam Advanced Threat Protection

Read more
Data Cornering - Journey in work with data

Data Cornering - Journey in work with data

Read more
GitHub - dfinke/ImportExcel: PowerShell module to import

GitHub - dfinke/ImportExcel: PowerShell module to import

Read more