These files represent how Remote Template injection works under the hood for MS Word documents.

Weaponization is following:

1. Create DOT/DOTM Word template with VBA macro inside (`execute-notepad-wscript.shell.dotm`)
2. Start up webserver hosting that file
3. Create benign MS Word document without macros, save it as DOCX (`docx-with-remote-template.docx`)
4. Then unpack DOCX to a directory with ZIP
5. Inject Remote Template by manipulating inner structures: `http://localhost:8080/`
6. Pack it up back to DOCX
7. Run that DOCX file.

The DOCX document should then connect to 


## Copyrights

> 
> Copyright (C) Binary-Offensive.com Mariusz Banach - All Rights Reserved
> Unauthorized copying of this file, via any medium is strictly prohibited.
>
> This file/directory was part of Modern Initial Access and Evasion Tactics training
> delivered by binary-offensive.com and was provided as supplemental material.
> 
> Authored by Mariusz Banach <mb@binary-offensive.com>, @mariuszbit / mgeeky
> 
