![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() |
The SECRET to Embedding Metasploit Payloads in VBA Macros (HackerSploit) View |
![]() |
Office VBA Macro - Metasploit (Tech69) View |
![]() |
Making Malicious Microsoft Office Files For Hacking (HaXeZ) View |
![]() |
LuckyStrike + Custom Metepreter payload method (DoktorCranium) View |
![]() |
Injecting Veil-Evasion Powershell Payloads into Office Documents (Cosmic 2x4) View |
![]() |
Payload Distribution Format (13Cubed) View |
![]() |
How Hackers Embed Trojans in Microsoft Documents (b100dy_c0d3r) View |
![]() |
Social Engineering PowerShell Empire - Macro (Cyberskills99) View |
![]() |
Hacking Domain Admin using Excel Macros | Initial Access, lateral Movement and post exploitation. (Cyberlinx Security) View |
![]() |
Deliver DNS Trojan with Microsoft Office Macro (Cobalt Strike Archive) View |