--- Name: te.exe Description: Testing tool included with Microsoft Test Authoring and Execution Framework (TAEF). Author: 'Oddvar Moe' Created: '2018-05-25' Commands: - Command: te.exe bypass.wsc Description: Run COM Scriptlets (e.g. VBScript) by calling a Windows Script Component (WSC) file. Usecase: Execute Visual Basic script stored in local Windows Script Component file. Category: Execute Privileges: User MitreID: T1218 MitreLink: https://attack.mitre.org/wiki/Technique/T1218 OperatingSystem: Windows Full_Path: - Path: Code_Sample: - Code: Detection: - IOC: Resources: - Link: https://twitter.com/gn3mes1s/status/927680266390384640?lang=bg Acknowledgement: - Person: Giuseppe N3mes1s Handle: '@gN3mes1s' ---