EvilClippy Logo

EvilClippy

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.

2,235
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

EvilClippy Description

EvilClippy is a cross-platform tool designed to create malicious Microsoft Office documents for security testing purposes. The tool provides capabilities to hide VBA macros within Office documents, making them less detectable by standard security analysis tools. It can perform VBA code stomping through P-Code manipulation, which replaces the readable VBA source code with compiled bytecode while maintaining functionality. EvilClippy is specifically designed to confuse and evade macro analysis tools that organizations use to detect malicious Office documents. The tool supports multiple operating systems including Linux, OSX, and Windows, providing flexibility for different testing environments. The primary use case for EvilClippy is in penetration testing and red team operations where security professionals need to create realistic phishing attack scenarios. It enables testers to evaluate an organization's defensive capabilities against sophisticated Office-based threats. The tool focuses on Microsoft Office document manipulation and provides various evasion techniques that mirror real-world attack methods used by malicious actors.

EvilClippy FAQ

Common questions about EvilClippy including features, pricing, alternatives, and user reviews.

EvilClippy is EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.. It is a Security Operations solution designed to help security teams with Red Team, Office 365, Evasion.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Core Security Outflank Security Tooling Logo

Red team toolkit for EDR evasion, initial access, and post-exploitation.

0
Core Security Cobalt Strike Logo

Post-exploitation threat emulation platform for red team operations.

0
Core Security Bundles and Suites Logo

Bundled offensive security suites combining pen testing, red teaming, and VM.

0
WebDAV Covert Channel Logo

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

0
Macro_Pack Logo

Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox