AdiMarianMutu / MSHTA-VBS-download-and-executeLinks
Downloads, decode, decrypt and executes a VBScript using cmd and mshta
☆18Updated 5 years ago
Alternatives and similar repositories for MSHTA-VBS-download-and-execute
Users that are interested in MSHTA-VBS-download-and-execute are comparing it to the libraries listed below
Sorting:
- Load PE via XML Attribute☆31Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Updated 5 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Download a .NET payload and run it on memory☆70Updated 6 years ago
- This script make any windows compatible with RDP connection☆21Updated last month
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- A small shellcode loader library written in C#☆48Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- The project uses popular anti-virus protection bypass techniques☆12Updated 6 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆56Updated 2 years ago
- Bypass AMSI☆14Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Updated 9 years ago
- Slui File Handler Hijack UAC Bypass Local Privilege Escalation☆94Updated 2 months ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 5 years ago
- The evolution of NxRansomware☆11Updated 6 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆52Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 4 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆21Updated 6 years ago
- Download and loader .NET payload☆37Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago