Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker Logo

Loading Alternate Data Stream (ADS) DLL/CPL Binaries to Bypass AppLocker

0
Free
Visit Website

A technique that utilizes Alternate Data Streams (ADS) to bypass AppLocker default policies by loading DLL/CPL binaries through various invocation methods like wmic, start, rundll32, and more, exploiting the ability of low privileged security groups to write to specific files and directories.

FEATURES

ALTERNATIVES

Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis with various tools and resources.

Preparation process for participating in the Pacific Rim CCDC 2015.

A tool for recursively querying webservers

A framework for exploiting Android-based devices and applications

A comprehensive .NET post-exploitation library designed for advanced security testing.

Performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.

A black-box obfuscation tool for Android apps with Android App Bundle support.

A cross-platform tool for creating malicious MS Office documents with hidden VBA macros and anti-analysis features.

PINNED