For my presentation and demo, I'll provide you with how I sent a select team of PowerSploit resources to your cleanse, isolated machine. Not surprisingly, Excel is known as vector for macro viruses for really a while and a lot of the methods--for instance hex-encoding binary details and re-encoding it on the goal equipment--are regarded binary inse