A PowerShell based utility for the creation of malicious Office macro documents.
Switch branches/tags
Clone or download
Latest commit df8bd1d Aug 17, 2017
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
test Template testing. All good. Jul 22, 2017
.gitignore Updated test materials Jul 20, 2017
LICENSE Initial commit Sep 22, 2016
README.md Update README.md Aug 17, 2017
_config.yml Set theme jekyll-theme-slate Jul 21, 2017
currentversion.txt Update currentversion.txt Jul 24, 2017
db.sql Updated comments Jul 23, 2017
install.ps1 Updated links to new repo Jul 22, 2017
luckystrike.ps1 Update luckystrike.ps1 Jul 24, 2017
update.ps1 Updated repo links. Jul 24, 2017

README.md

luckystrike

A PowerShell based utility for the creation of malicious Office macro documents. To be used for pentesting or educational purposes only.

Getting Started

  1. Read this: http://www.shellntel.com/blog/2016/9/13/luckystrike-a-database-backed-evil-macro-generator.
  2. Read the wiki!
  3. Make sure you are on a Win7-10 machine (32 or 64bit).
  4. You must be running a current version of PowerShell (v5+).
  5. You must have Microsoft Excel installed (I did my testing with 2013).
  6. From an ADMINISTRATIVE PowerShell prompt, run the following command. A luckystrike folder will be created for you.
  7. iex (new-object net.webclient).downloadstring('https://git.io/v7kbp')
  8. Run .\luckystrike\luckystrike.ps1 (also as an administrator).

If you have a problem

  1. Run luckystrike with the -Debug switch. This will generate a debug .log file in the luckystrike directory.
  2. Reproduce the issue
  3. Take a screenshot of the error
  4. Submit a github issue with the screenshot & debug log attached.
  5. Be patient. I'm one guy. :-)