/luckystrike

A PowerShell based utility for the creation of malicious Office macro documents.

Primary LanguagePowerShellGNU General Public License v3.0GPL-3.0

luckystrike

A PowerShell based utility for the creation of malicious Office macro documents. To be used for pentesting or educational purposes only.

Getting Started

  1. Read this: http://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator.
  2. Read the wiki!
  3. Make sure you are on a Win7-10 machine (32 or 64bit).
  4. You must be running a current version of PowerShell (v5+).
  5. You must have Microsoft Excel installed (I did my testing with 2013).
  6. From an ADMINISTRATIVE PowerShell prompt, run the following command. A luckystrike folder will be created for you.
  7. iex (new-object net.webclient).downloadstring('https://git.io/v7kbp')
  8. Run .\luckystrike\luckystrike.ps1 (also as an administrator).

If you have a problem

  1. Run luckystrike with the -Debug switch. This will generate a debug .log file in the luckystrike directory.
  2. Reproduce the issue
  3. Take a screenshot of the error
  4. Submit a github issue with the screenshot & debug log attached.
  5. Be patient. I'm one guy. :-)