mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 13:05:26 +01:00 
			
		
		
		
	updates
This commit is contained in:
		@@ -100,7 +100,7 @@ function Bypass-CLM
 | 
			
		||||
    Write-Host "`tAppLocker Constrined Language Mode Bypass via COM"
 | 
			
		||||
    Write-Host "`t(implementation of: @xpn's technique, as documented in:)"
 | 
			
		||||
    Write-Host "`t(https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com/)"
 | 
			
		||||
    Write-Host "`n`tRe-implemented, enhanced by: Mariusz B., mgeeky"
 | 
			
		||||
    Write-Host "`n`tRe-implemented, enhanced by: Mariusz Banach, mgeeky"
 | 
			
		||||
    Write-Host "`t-----`n"
 | 
			
		||||
 | 
			
		||||
    Write-Host "[.] Step 0. Planted DLL files in:`n`t$dstAssemblyPath`n`t$dstDllPath"
 | 
			
		||||
 
 | 
			
		||||
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							@@ -2,7 +2,7 @@
 | 
			
		||||
 * This DLL hosts CLR4 environment from within a native binary. This way it is possible to
 | 
			
		||||
 * call .NET APIs from an unmanaged runtime.
 | 
			
		||||
 *
 | 
			
		||||
 * Mariusz B., mgeeky, 19'
 | 
			
		||||
 * Mariusz Banach, mgeeky, 19'
 | 
			
		||||
 *
 | 
			
		||||
**/
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -26,7 +26,7 @@ PS > .\Bypass-CLM.ps1
 | 
			
		||||
        (implementation of: @xpn's technique, as documented in:)
 | 
			
		||||
        (https://www.mdsec.co.uk/2018/09/applocker-clm-bypass-via-com/)
 | 
			
		||||
 | 
			
		||||
        Re-implemented, enhanced by: Mariusz B., mgeeky
 | 
			
		||||
        Re-implemented, enhanced by: Mariusz Banach, mgeeky
 | 
			
		||||
        -----
 | 
			
		||||
 | 
			
		||||
[.] Step 0. Planted DLL files in:
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user