<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>microsoft-office</title>
    <link rel="self" type="application/atom+xml" href="https://links.biapy.com/guest/tags/1203/feed"/>
    <updated>2026-04-19T00:24:09+00:00</updated>
    <id>https://links.biapy.com/guest/tags/1203/feed</id>
            <entry>
            <id>https://links.biapy.com/links/10748</id>
            <title type="text"><![CDATA[Spire.Doc for Python]]></title>
            <link rel="alternate" href="https://www.e-iceblue.com/Introduce/doc-for-python.html" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/10748"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Spire.Doc for Python is a professional Word Python API specifically designed for developers to create, read, write, convert and compare Word documents with fast and high-quality performance.

Related contents:

- [Automating Word Document Creation with Python: A Practical Guide @ Allen Yang&amp;#039;s dev.to](https://dev.to/allen_yang_f905170c5a197b/automating-word-document-creation-with-python-a-practical-guide-21lf).]]>
            </summary>
            <updated>2025-10-21T06:25:13+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/1551</id>
            <title type="text"><![CDATA[Kreuzberg]]></title>
            <link rel="alternate" href="https://github.com/Goldziher/kreuzberg" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/1551"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A text extraction library supporting PDFs, images, office documents and more.

Kreuzberg is a Python library for text extraction from documents. It provides a unified async interface for extracting text from PDFs, images, office documents, and more.]]>
            </summary>
            <updated>2025-08-28T20:15:28+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/2220</id>
            <title type="text"><![CDATA[MarkItDown]]></title>
            <link rel="alternate" href="https://github.com/microsoft/markitdown" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/2220"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[Python tool for converting files and office documents to Markdown.
MarkItDown is a utility for converting various files to Markdown (e.g., for indexing, text analysis, etc).

- [MarkItDown-MCP @ GitHub](https://github.com/microsoft/markitdown/tree/main/packages/markitdown-mcp).

Related contents:

- [MarkItDown - Convertissez tous vos documents en Markdown très facilement @ Korben :fr:](https://korben.info/markitdown-convertisseur-fichiers-markdown.html).
- [Convertir un document au format Markdown avec MarkItDown : Word, PDF, PowerPoint, Excel, etc. @ IT-Connect :fr:](https://www.it-connect.fr/convertir-un-document-au-format-markdown-avec-markitdown/).]]>
            </summary>
            <updated>2026-03-06T14:52:52+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3072</id>
            <title type="text"><![CDATA[pwnlook]]></title>
            <link rel="alternate" href="https://github.com/amjcyber/pwnlook" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3072"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails configured in it.]]>
            </summary>
            <updated>2025-08-29T00:28:27+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/3927</id>
            <title type="text"><![CDATA[macro_pack]]></title>
            <link rel="alternate" href="https://github.com/sevagas/macro_pack" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/3927"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to fin… 

- [Episode #466 consacré à BallisKit Avec Emeric Nasi @ NoLimitSecu :fr:](https://www.nolimitsecu.fr/balliskit/).]]>
            </summary>
            <updated>2025-08-29T02:50:46+00:00</updated>
        </entry>
            <entry>
            <id>https://links.biapy.com/links/4639</id>
            <title type="text"><![CDATA[DetectingCanaryTokens]]></title>
            <link rel="alternate" href="https://github.com/Lupovis/DetectingCanaryTokens" />
            <link rel="via" type="application/atom+xml" href="https://links.biapy.com/links/4639"/>
            <author>
                <name><![CDATA[Biapy]]></name>
            </author>
            <summary type="text">
                <![CDATA[A Red Team Script to Detect Canary Tokens and Seed Files. How to Detect Canary and Seed Microsoft Office Files with Python Without Triggering an Alert.

In the realm of cybersecurity, vigilance is key. One way malicious actors might infiltrate systems is through seemingly innocuous Microsoft Office files. These files might contain hidden URLs or macros designed to execute harmful actions. In this blog post, we&amp;#039;ll explore a Python script designed to detect potentially suspicious Microsoft Office documents by examining their contents without opening them directly, reducing the risk of inadvertently triggering malicious code.]]>
            </summary>
            <updated>2025-08-29T04:50:50+00:00</updated>
        </entry>
    </feed>
