Infiltr8: The Red-Book
Ctrlk
Infiltr8ForumGitHub
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
    • Initial Access
      • Network Services
      • Password Attacks
      • Phishing
        • HTML Smuggling
        • Phishing with Calendars (.ICS Files)
        • Phishing With Microsoft Office
          • MS Office - VBA (Macros)
          • MS Office - RTF Files RCE
          • MS Office - Custom XML parts
          • 🛠️MS Office - Excel 4.0 (XLM) Macros
          • 🛠️MS Office - VBA Stomping
          • 🛠️MS Office - Remote Dotm Template Injection
        • 🛠️Phishing via Proxy
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • 🛠️Cloud & CI/CD Pentesting
    • CI/CD
    • Azure Pentesting
    • GCP Pentesting
    • AWS Pentesting
  • 🛠️Smart Contracts Pentesting
    • Solidity
Powered by GitBook
On this page

Was this helpful?

Edit
  1. Red-Teaming
  2. Initial Access
  3. Phishing

Phishing With Microsoft Office

MS Office - VBA (Macros)MS Office - RTF Files RCEMS Office - Custom XML parts🛠️MS Office - Excel 4.0 (XLM) Macros🛠️MS Office - VBA Stomping🛠️MS Office - Remote Dotm Template Injection

Was this helpful?