AdiMarianMutu / MSHTA-VBS-download-and-executeLinks
Downloads, decode, decrypt and executes a VBScript using cmd and mshta
☆19Updated 5 years ago
Alternatives and similar repositories for MSHTA-VBS-download-and-execute
Users that are interested in MSHTA-VBS-download-and-execute are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆36Updated 5 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Generate a ms batch file and inject a files inside of it. When the batch is executed, the files are extracted and executed.☆21Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Load PE via XML Attribute☆32Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 4 months ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Updated 4 years ago
- Hide .Net assembly into png images☆36Updated 6 years ago
- Download and loader .NET payload☆36Updated 6 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Updated 6 years ago
- A small shellcode loader library written in C#☆48Updated 3 years ago
- Bypass AMSI☆13Updated 4 years ago
- The evolution of NxRansomware☆11Updated 6 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Updated 10 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 5 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Updated 2 years ago
- Collection of shellcode injection and execution techniques☆18Updated 3 months ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Updated 6 years ago
- Execute .Net assemblies using Rundll32.exe☆113Updated 4 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- Extracting Syscall Stub, Modernized☆66Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Updated 7 years ago
- The project uses popular anti-virus protection bypass techniques☆12Updated 7 years ago
- Simple c# source code obfuscator☆28Updated 7 years ago
- Small POC written in C# that performs shellcode injection on x64 processes using direct syscalls as a way to bypass user-land EDR hooks.☆84Updated 5 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 4 years ago