pcodedmp
oletools
pcodedmp | oletools | |
---|---|---|
2 | 5 | |
437 | 2,749 | |
- | - | |
0.0 | 5.5 | |
almost 3 years ago | 8 days ago | |
Python | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pcodedmp
-
Anyone know where VBA would stand efficiency-wise on this list? I can't seem to find any VBA efficiency studies.
The read-me of this github repo has a good overview of the process, from which the below is taken:
-
How to programmatically verify that VBA signature is valid
vbaProject.bin - Holds compressed versions of the human text VBA code, and the compiled "P-code". See: https://github.com/bontchev/pcodedmp
oletools
-
How can I find a hidden flag inside a Microsoft word document?
oletools might help - https://github.com/decalage2/oletools
-
Excel Macro code(VBA code) protection site (free)
Resistance to several code extraction tools. ( eg. olevba)
-
The project with a single 11,000-line code file
I currently maintain a 5k line VBA Word macro - naturally it's business critical. It used to be longer with all the version-control-comments, but thankfully I've managed to get the macro file versioned under git and remove all of those green lines (look into oletools and git hooks - far from perfect, but good enough).
-
Mailflow rule: notify recipient and and senders adress in notification
Its a good direction but far from perfection. Office can use a huge amount of features which can execute code: Github oletools table
- This table shows the various techniques that can be used in malicious documents to trigger code execution, and the file formats in which they can be embedded. The last row suggests tools that can detect and analyse each technique.
What are some alternatives?
macro_pack - macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Open-Source Vulkan C++ API - Open-Source Vulkan C++ API
plasma - Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
ViperMonkey - A VBA parser and emulation engine to analyze malicious macros.
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
excel-contact-tools - Save a ton of time using this Excel macro addin when working with your colleagues' contact details in Excel
git-xl - Git extension: Makes git-diff work for VBA in Excel workbooks (xls* file types)
EVE-IPH - Code for the EVE Isk per Hour program
ReactSelfbot - The best (and now open source) Discord selfbot.
.NET Runtime - .NET is a cross-platform runtime for cloud, mobile, desktop, and IoT apps.
RestHome - Macro Controlled Broadlink RM/RM2/RM Pro/RM3/BlackBean/A1 Web server with REST API (like..)
linux - Linux kernel source tree