AdiMarianMutu / MSHTA-VBS-download-and-executeLinks
Downloads, decode, decrypt and executes a VBScript using cmd and mshta
☆18Updated 5 years ago
Alternatives and similar repositories for MSHTA-VBS-download-and-execute
Users that are interested in MSHTA-VBS-download-and-execute are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆37Updated 5 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 5 years ago
- Extracting Syscall Stub, Modernized☆65Updated 3 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆55Updated 2 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆40Updated 4 years ago
- POC runtime crypter☆9Updated 6 years ago
- The project uses popular anti-virus protection bypass techniques☆13Updated 6 years ago
- Bypass AMSI☆14Updated 4 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆62Updated 3 years ago
- C# project to create or modify existing LNKs☆55Updated 2 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- A small shellcode loader library written in C#☆47Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆13Updated 3 years ago
- A simple POC to demonstrate the power of .NET debugging for injection☆72Updated 4 years ago
- Uses WMI Event Win32_ModuleLoadTrace to monitor module loading. Provides filters, and detailed data. Has an option to monitor for CLR Inj…☆42Updated 6 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆69Updated 4 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Updated 5 years ago
- Runpe + DInvoke + Syscall☆16Updated 4 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆56Updated 3 years ago