Ivy Logo

Ivy

0
Free
Visit Website

Ivy is a payload creation framework that enables the execution of arbitrary VBA (macro) source code directly in memory. It achieves this by utilizing programmatical access in the VBA object environment to load, decrypt, and execute shellcode. This framework provides a powerful tool for payload creation and execution, allowing for flexible and stealthy operations. Ivy's loader is designed to load, decrypt, and execute shellcode directly in memory, making it a valuable asset for penetration testers and red teams. The framework's ability to execute arbitrary VBA source code in memory makes it an attractive option for those looking to bypass traditional security controls. With Ivy, users can create and execute custom payloads, allowing for tailored attacks and increased flexibility during operations. The framework's programmatical access to the VBA object environment also enables the execution of shellcode, making it a powerful tool in the hands of security professionals.

FEATURES

ALTERNATIVES

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

CLI tool for offensive and defensive security assessments on the Joi validator library with a wide range of attacks.

Local pentest lab using docker compose to spin up victim and attacker services.

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.

A collection of tests for Local File Inclusion (LFI) vulnerabilities using Burp Suite.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved