AdiMarianMutu / MSHTA-VBS-download-and-execute
Downloads, decode, decrypt and executes a VBScript using cmd and mshta
☆18Updated 4 years ago
Alternatives and similar repositories for MSHTA-VBS-download-and-execute
Users that are interested in MSHTA-VBS-download-and-execute are comparing it to the libraries listed below
Sorting:
- Execute .Net assemblies using Rundll32.exe☆110Updated 4 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Hide code from dnSpy and other C# spying tools☆42Updated 4 years ago
- Unhook DLL via cleaning the DLL 's .text section☆9Updated 3 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- C# Codedom example / builder☆24Updated 5 years ago
- Hide .Net assembly into png images☆36Updated 5 years ago
- ProcessHollowing via csharp☆12Updated 3 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated last year
- Bypass AMSI☆14Updated 3 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆54Updated last year
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆21Updated 4 years ago
- A small shellcode loader library written in C#☆46Updated 3 years ago
- Extracting Syscall Stub, Modernized☆64Updated 3 years ago
- CreateProcessAsUser experiments☆6Updated 9 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Updated 6 years ago
- C# project to create or modify existing LNKs☆55Updated 2 years ago
- ☆41Updated 5 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- .NET 2.0 CLR project to retrieve saved browser credentials from Google Chrome, Mozilla Firefox and Microsoft Internet Explorer/Edge.☆21Updated 6 years ago
- .NET project for writing files to local or remote hosts☆41Updated 5 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- .Net Assembly to block ETW telemetry in current process☆79Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆27Updated 6 years ago
- The project uses popular anti-virus protection bypass techniques☆13Updated 6 years ago
- ☆12Updated 4 years ago
- Bypass UAC at any level by abusing the Task Scheduler and environment variables☆31Updated 3 years ago
- Load a fresh new copy of ntdll.dll via file mapping to bypass API inline hook.☆61Updated 3 years ago
- Collection of shellcode injection and execution techniques☆17Updated 3 years ago