Generalising file paths and urls, see #10 (#422)

This commit is contained in:
Wietze
2025-01-28 11:15:01 +00:00
committed by GitHub
parent e62749f81a
commit a79893e7ad
196 changed files with 555 additions and 758 deletions

View File

@@ -1,11 +1,11 @@
---
Name: Regasm.exe
Description: Part of .NET
Author: 'Oddvar Moe'
Author: Oddvar Moe
Created: 2018-05-25
Commands:
- Command: regasm.exe AllTheThingsx64.dll
Description: Loads the target .Net DLL file and executes the RegisterClass function.
- Command: regasm.exe {PATH:.dll}
Description: Loads the target .NET DLL file and executes the RegisterClass function.
Usecase: Execute code and bypass Application whitelisting
Category: AWL Bypass
Privileges: Local Admin
@@ -13,7 +13,7 @@ Commands:
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
Tags:
- Execute: DLL (.NET)
- Command: regasm.exe /U AllTheThingsx64.dll
- Command: regasm.exe /U {PATH:.dll}
Description: Loads the target .DLL file and executes the UnRegisterClass function.
Usecase: Execute code and bypass Application whitelisting
Category: Execute