The Red Team Vade Mecum
search
Ctrlk
The Red Team Vade Mecum
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasion
    • Privilege Escalation
    • Enumeration
    • Execution
    • Initial Access
      • Tips and Tricks
      • Tools
      • Staging/Stagers
      • MS Office
        • Macros
          • Evasion
          • Info Extraction
          • Inline Shapes
          • .MAM Files
          • PowerPoint
          • ACCDE
          • Shellcode Execution
          • Info Extraction
          • Dechaining Macros
        • Field Abuse
        • DDE
      • Payload Delivery
      • File Formats
    • Lateral Movement
    • Code Injection
    • Persistence
  • Infrastructure
    • SQL
  • Other
    • Vulnerability Discovery
    • Windows Internals
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Initial Accesschevron-right
  3. MS Office

Macros

Evasionchevron-rightInfo Extractionchevron-rightInline Shapeschevron-right.MAM Fileschevron-rightPowerPointchevron-rightACCDEchevron-rightShellcode Executionchevron-rightInfo Extractionchevron-rightDechaining Macroschevron-right
PreviousMS Officechevron-leftNextEvasionchevron-right

Last updated 4 years ago