AdiMarianMutu / MSHTA-VBS-download-and-executeLinks
Downloads, decode, decrypt and executes a VBScript using cmd and mshta
☆18Updated 5 years ago
Alternatives and similar repositories for MSHTA-VBS-download-and-execute
Users that are interested in MSHTA-VBS-download-and-execute are comparing it to the libraries listed below
Sorting:
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- CreateProcessAsUser experiments☆6Updated 9 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated 2 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- .NET project for writing files to local or remote hosts☆41Updated 5 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- A small shellcode loader library written in C#☆46Updated 3 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Bypass AMSI☆14Updated 3 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- Loader and RunPE file executer☆17Updated 6 years ago
- C# project to create or modify existing LNKs☆55Updated 2 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- ProcessHollowing via csharp☆12Updated 3 years ago
- One gate to all syscalls!☆23Updated 3 years ago
- C# Implementation of Get-VaultCredential☆14Updated 6 years ago
- PoC: Prevent a debugger from attaching to managed .NET processes via a watcher process code pattern.☆32Updated 6 years ago
- How to bypass antivirus 2020☆7Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆20Updated 2 years ago
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- ☆41Updated 5 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆27Updated 5 years ago