Evilclippy.exe使用教程

一、evilclippy.exe相关命令

evilclippy.exe -h			#查看帮助
evilclippy.exe -g macrofile.doc			#在GUI种隐藏宏
evilclippy.exe -s fakecode.vba macrofile.doc			#p_code伪代码
evilclippy.exe -r macrofile.doc 					#设置随机模块名(混淆安全分析工具)
evilclippy.exe -u macrofile.doc 					#设置远程VBA项目锁定保护
evilclippy.exe -s fakecode.vba -w 8080 macrofile.doc 	#通过http服务提供VBAstomp模板

二、evilclippy.exe帮助信息

Usage: eviloffice.exe [OPTIONS]+ filename

Author: Stan Hegt
Email: [email protected]

Options:
  -n, --name=VALUE           The target module name to stomp.
                               This argument can be repeated.
  -s, --sourcefile=VALUE     File containing substitution VBA code (fake
                               code).
  -g, --guihide              Hide code from VBA editor GUI.
      --gg, --guiunhide      Unhide code from VBA editor GUI.
  -t, --targetversion=VALUE  Target MS Office version the pcode will run on.
  -w, --webserver=VALUE      Start web server on specified port to serve
                               malicious template.
  -d, --delmetadata          Remove metadata stream (may include your name
                               etc.).
  -r, --randomnames          Set random module names, confuses some analyst
                               tools.
      --rr, --resetmodulenames
                             Undo the set random module names by making the
                               ASCII module names in the DIR stream match their
                               Unicode counter parts
  -u, --unviewableVBA        Make VBA Project unviewable/locked.
      --uu, --viewableVBA    Make VBA Project viewable/unlocked.
  -v                         Increase debug message verbosity.
  -h, --help                 Show this message and exit.

猜你喜欢

转载自blog.csdn.net/dakhda/article/details/132623850
今日推荐