πŸ§‘β€πŸ’»
B00t2R00t
search
⌘Ctrlk
πŸ§‘β€πŸ’»
B00t2R00t
  • README
  • LICENSE
  • Active Directory Penetration Testing
  • Artificial Intelligence (AI) Penetration Testing
  • TODO LATER:
  • CVE
  • Cloud Penetration Testing
  • Data Lake Penetration Testing
  • Exploit Development
  • Methodology
  • Network Penetration Testing
  • Pivoting
  • Web Application Penetration Testing
  • Wireless Penetration Testing
  • Miscellaneous
  • Privilege Escalation
  • Red Teaming
    • Advanced Techniques
      • NativeProcInjeciton
      • NtMapInjection
      • NtQueueApc
      • Process Hollowing
      • Process Injection
      • Shellcode Hollower
      • Shellcode Inject
      • HTA
        • C# for CLM Bypass with DotNetToJScript
        • C# for CLM Bypass with PS Script
        • JScript from SuperSharpShooter
      • JScript
    • Command And Control
    • Data Exfiltration
    • Evasion Techniques
    • Living of the Land Binaries (LOLBINs)
    • OSINT
    • Offensive Powershell
    • Password Attacks
    • Payloads
    • Playbooks
    • Shellcode Runners
    • Spearfishing Attacks
    • Stagers
    • The Lay Of The Land
    • Useful Attacks
  • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Red Teamingchevron-right
  2. Advanced Techniques

HTA

C# for CLM Bypass with DotNetToJScriptchevron-rightC# for CLM Bypass with PS Scriptchevron-rightJScript from SuperSharpShooterchevron-right
PreviousShellcode Injectchevron-leftNextC# for CLM Bypass with DotNetToJScriptchevron-right

Last updated 4 months ago