Media Summary: Showing how to analyze a malicious Excel document with Working on a new tool to extract macros and embedded files from MS Office files. I'm showing how to analyze a malicious Word document (macro malware) without Microsoft technology.

Oledump Clipboardtransformer - Detailed Analysis & Overview

Showing how to analyze a malicious Excel document with Working on a new tool to extract macros and embedded files from MS Office files. I'm showing how to analyze a malicious Word document (macro malware) without Microsoft technology. Analyzing another malicious document stored in XML, now pure command-line. Analyzing a new type of malicious document: XML. Analyzing another malicious document stored in XML.

Scenario: Adversaries may send spearphishing messages with malicious attachments to elicit sensitive information that can be ... We analyze an Office maldoc sample that is suited for analysis with ViperMonkey, a free open-source VBA Emulator. More details ... Can Ceph Tentacle finally make erasure coding viable for VM storage? In this deep dive, Mitch breaks down the real-world ... Welcome to Part 2 of the Transformer Architecture Series! In this video, we do a complete deep dive into the Transformer Decoder ... Build a working Indeed job crawler and scraper in minutes using Claude Code and the ScrapeOps AI Scraper Builder plugin. Welcome to ORCA 6 Tutorial ! In this video, you will learn how to create an ORCA 6 input file for Geometry Optimization of ...

To scan all files in network traffic, organizations can integrate F5's traffic scanning with OPSWAT's file scanning so that every file ... Wyebot focuses on closing the "visibility gap" between infrastructure-reported data and the actual end-user experience by utilizing ... Your logs have email addresses. Your metrics have 100K time series. Half your traces are health checks nobody looks at. Sound ...

Photo Gallery

oledump  & ClipboardTransformer
oledump plugin_biff
oledump.py beta
oledump With Plugins: Malicious Word Document Analysis
How-To: Installing Oledump in Windows
oledump: plugin_msg
oledump And Yet Another XML (Bis)
oledump XML
oledump And Yet Another XML
oledump.py --extra
MITRE T1598.002: Email Spearphishing Investigation with Oledump
Analyzing an Office Maldoc with a VBA Emulator
View Detailed Profile
oledump  & ClipboardTransformer

oledump & ClipboardTransformer

Showing some features of my

oledump plugin_biff

oledump plugin_biff

Showing how to analyze a malicious Excel document with

oledump.py beta

oledump.py beta

Working on a new tool to extract macros and embedded files from MS Office files.

oledump With Plugins: Malicious Word Document Analysis

oledump With Plugins: Malicious Word Document Analysis

I'm showing how to analyze a malicious Word document (macro malware) without Microsoft technology.

How-To: Installing Oledump in Windows

How-To: Installing Oledump in Windows

Installing

oledump: plugin_msg

oledump: plugin_msg

More info: https://videos.didierstevens.com/2018/08/19/

oledump And Yet Another XML (Bis)

oledump And Yet Another XML (Bis)

Analyzing another malicious document stored in XML, now pure command-line.

oledump XML

oledump XML

Analyzing a new type of malicious document: XML.

oledump And Yet Another XML

oledump And Yet Another XML

Analyzing another malicious document stored in XML.

oledump.py --extra

oledump.py --extra

oledump.py --extra

MITRE T1598.002: Email Spearphishing Investigation with Oledump

MITRE T1598.002: Email Spearphishing Investigation with Oledump

Scenario: Adversaries may send spearphishing messages with malicious attachments to elicit sensitive information that can be ...

Analyzing an Office Maldoc with a VBA Emulator

Analyzing an Office Maldoc with a VBA Emulator

We analyze an Office maldoc sample that is suited for analysis with ViperMonkey, a free open-source VBA Emulator. More details ...

count.py

count.py

count.py

Ceph Tentacle Performance Test: Fast EC vs 3x Replication for VM Workloads

Ceph Tentacle Performance Test: Fast EC vs 3x Replication for VM Workloads

Can Ceph Tentacle finally make erasure coding viable for VM storage? In this deep dive, Mitch breaks down the real-world ...

Transformer Decoder Arch During Training Time - Pen & Paper Explaination | Transformer Series Part2

Transformer Decoder Arch During Training Time - Pen & Paper Explaination | Transformer Series Part2

Welcome to Part 2 of the Transformer Architecture Series! In this video, we do a complete deep dive into the Transformer Decoder ...

From URL to Production Indeed com Job Scraper Code in 15 Minutes

From URL to Production Indeed com Job Scraper Code in 15 Minutes

Build a working Indeed job crawler and scraper in minutes using Claude Code and the ScrapeOps AI Scraper Builder plugin.

How to make ORCA 6 input file for Geometry Optimization of Organic Molecules | ORCA 6 Tutorial | #06

How to make ORCA 6 input file for Geometry Optimization of Organic Molecules | ORCA 6 Tutorial | #06

Welcome to ORCA 6 Tutorial #06! In this video, you will learn how to create an ORCA 6 input file for Geometry Optimization of ...

How to Scan All Files in Network Traffic | F5 BIG-IP + OPSWAT MetaDefender Explained

How to Scan All Files in Network Traffic | F5 BIG-IP + OPSWAT MetaDefender Explained

To scan all files in network traffic, organizations can integrate F5's traffic scanning with OPSWAT's file scanning so that every file ...

Defining the Future of Vendor-Neutral Assurance with Wyebot

Defining the Future of Vendor-Neutral Assurance with Wyebot

Wyebot focuses on closing the "visibility gap" between infrastructure-reported data and the actual end-user experience by utilizing ...

OTTL in Action: Stop Shipping Junk Telemetry to Your Backend

OTTL in Action: Stop Shipping Junk Telemetry to Your Backend

Your logs have email addresses. Your metrics have 100K time series. Half your traces are health checks nobody looks at. Sound ...