Malicious Office Macro Visualizer

Extract VBA strings, highlight suspicious patterns and visualize a static call graph — all client-side (safe).
Local-only · No uploads
Click or drop Office file (.docm/.xlsm/.pptm/.doc/.xls)
Tool will extract printable VBA strings and build a static call graph. Recommended < 10 MB.
Total items: 0
Suspicious: 0
Tip: This tool uses a client-side ZIP parser (JSZip). No file data leaves your browser. If the file is heavily obfuscated or uses compressed vbaProject streams, consider a full offline toolchain for deeper analysis.
Extracted Strings & Functions
No file analyzed yet.
Uses JSZip (client-side) to extract macros from OOXML packages. No network transmission of files.