Skip to content

detected by windows defender #9

@ghost

Description

win 10 defender detected the code in the excel macro enabled work book.
Used veil-evasion>reverse_https generated .bat
used macroshop>python macro_safe.py /home/test.bat test.txt
on windows machine I opened excel, went into devloper>visual basic> workbook and pasted output code from macro_safe.py into workbook and it was detected when I try to save it. saved as extension macro-enabled workbook.

screenshot 2016-07-24 14 40 38
is there any other work around for this?

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions