The Red Team Vade Mecum
search
Ctrlk
  • The Red Team Vade Mecum
  • Techniques
    • Defense Evasionchevron-right
    • Privilege Escalationchevron-right
    • Enumerationchevron-right
    • Executionchevron-right
    • Initial Accesschevron-right
      • Tips and Tricks
      • Tools
      • Staging/Stagers
      • MS Officechevron-right
        • Macroschevron-right
          • Evasionchevron-right
            • VBA Stomping
            • Revert To Legacy Warning in Excel
            • Sandbox Evasion
          • Info Extraction
          • Inline Shapes
          • .MAM Files
          • PowerPoint
          • ACCDE
          • Shellcode Execution
          • Info Extraction
          • Dechaining Macros
        • Field Abuse
        • DDE
      • Payload Delivery
      • File Formatschevron-right
    • Lateral Movementchevron-right
    • Code Injectionchevron-right
    • Persistencechevron-right
  • Infrastructure
    • SQLchevron-right
  • Other
    • Vulnerability Discoverychevron-right
    • Windows Internalschevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniqueschevron-right
  2. Initial Accesschevron-right
  3. MS Officechevron-right
  4. Macros

Evasion

VBA Stompingchevron-rightRevert To Legacy Warning in Excelchevron-rightSandbox Evasionchevron-right
PreviousMacroschevron-leftNextVBA Stompingchevron-right

Last updated 4 years ago