Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts Logo

Executing Commands and Bypassing AppLocker with PowerShell Diagnostic Scripts

0
Free
Visit Website

While investigating this directory structure, I came across an interesting directory structure that contained diagnostic scripts located at the following ‘parent’ path: %systemroot%diagnosticssystem\. In particular, two subdirectories (AERO) and (Audio) contained two very interesting, signed PowerShell Scripts: CL_Invocation.ps1 CL_LoadAssembly.ps1 CL_Invocation.ps1 provides a function (SyncInvoke) to execute binaries through System.Diagnostics.Process. and CL_LoadAssembly.ps1 provides two functions (LoadAssemblyFromNS and LoadAssemblyFromPath) for loading .NET/C# assemblies (DLLs/EXEs).

FEATURES

ALTERNATIVES

A Linux-based environment for penetration testing and vulnerability exploitation

A cross-platform web fuzzer written in Nim

A Python library for exploiting race conditions in web apps

Docker image with essential tools for Kubernetes penetration testing.

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

A set of YARA rules for identifying files containing sensitive information

CobaltBus enables Cobalt Strike C2 traffic via Azure Servicebus for enhanced covert operations.

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.