mirror of
https://github.com/mgeeky/Penetration-Testing-Tools.git
synced 2025-09-03 02:28:34 +02:00
updates
This commit is contained in:
@ -100,7 +100,7 @@ function Bypass-CLM
|
||||
Write-Host "`tAppLocker Constrined Language Mode Bypass via COM"
|
||||
Write-Host "`t(implementation of: @xpn's technique, as documented in:)"
|
||||
Write-Host "`t(https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com/)"
|
||||
Write-Host "`n`tRe-implemented, enhanced by: Mariusz B., mgeeky"
|
||||
Write-Host "`n`tRe-implemented, enhanced by: Mariusz Banach, mgeeky"
|
||||
Write-Host "`t-----`n"
|
||||
|
||||
Write-Host "[.] Step 0. Planted DLL files in:`n`t$dstAssemblyPath`n`t$dstDllPath"
|
||||
|
File diff suppressed because one or more lines are too long
@ -2,7 +2,7 @@
|
||||
* This DLL hosts CLR4 environment from within a native binary. This way it is possible to
|
||||
* call .NET APIs from an unmanaged runtime.
|
||||
*
|
||||
* Mariusz B., mgeeky, 19'
|
||||
* Mariusz Banach, mgeeky, 19'
|
||||
*
|
||||
**/
|
||||
|
||||
|
@ -26,7 +26,7 @@ PS > .\Bypass-CLM.ps1
|
||||
(implementation of: @xpn's technique, as documented in:)
|
||||
(https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com/)
|
||||
|
||||
Re-implemented, enhanced by: Mariusz B., mgeeky
|
||||
Re-implemented, enhanced by: Mariusz Banach, mgeeky
|
||||
-----
|
||||
|
||||
[.] Step 0. Planted DLL files in:
|
||||
|
Reference in New Issue
Block a user