# Phishing-with-Ms-office

- [Phishing: XLM / Macro 4.0](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-xlm-macro-4.0.md)
- [T1173: Phishing - DDE](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/t1173-phishing-dde.md): Dynamic Data Exchange code - executing code in Microsoft Office documents.
- [T1137: Phishing - Office Macros](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/t1137-phishing-office-macros.md): Code execution with VBA Macros
- [Phishing: OLE + LNK](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-ole-+-lnk.md): Code execution with embedded Internet Explorer Object
- [Phishing: Embedded Internet Explorer](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-embedded-internet-explorer.md): Code execution with embedded Internet Explorer Object
- [Phishing: .SLK Excel](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-.slk-excel.md)
- [Phishing: Replacing Embedded Video](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-replacing-embedded-video.md): with Bogus Payload
- [Inject Macros from a Remote Dotm Template](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/inject-macros-from-a-remote-dotm-template.md)
- [Bypassing Parent Child / Ancestry Detections](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/bypassing-parent-child-ancestry-detections.md)
- [Phishing: Embedded HTML Forms](/hackersnotes/offensive-security/initial-access/phishing-with-ms-office/phishing-embedded-html-forms.md)
