For my presentation and demo, I'll demonstrate how I sent a choose team of PowerSploit applications to a cleanse, isolated machine. Obviously, Excel is often known as vector for macro viruses for quite some time and several of the techniques--for instance hex-encoding binary information and re-encoding it on the goal machine--are recognised binary