-
Proof of Concept code for
#shellcode loading in#JScript by abusing#Excel 4#macros via#COM. https://github.com/outflanknl/Scripts/blob/master/ShellcodeToJScript.js …#DotNetToJScript#RedTeam //By@StanHacked -
#JS script executes#NET (#js code is generated with#DotNetToJScript tool developed by@tiraniddo) - I decompiled the embedded serialized .NET object with#ILSpy. Seems is a practice but was also good for me. https://www.hybrid-analysis.com/sample/f601475c9f53f64e54984fc436a7316fdd1312c4e6212d2587935c4e278c0319?environmentId=100 …pic.twitter.com/hJkQeAS024
-
W00t! Just got
#Gryffindor working with#SharpSploit via#DotNetToJScript! PostEx is suddenly looking bright! Much thanks to@tiraniddo and@cobbr_io for all your hard work on those wonderful projects
pic.twitter.com/Y5eL9qskck
-
Security Intelligence: Fileless Malware CactusTorch Executes Harmful .NET Assemblies From Memory http://securityintelligence.com/news/fileless-malware-cactustorch-executes-harmful-net-assemblies-from-memory/ …
#ouch#malware#DotNetToJScript -
2.
@_RastaMouse (cc:@subTee) for this gem on C# ->#DotNetToJScript -> XSL -> execution via#WMIC#redteamPrikaži ovu nit -
Is sb making a new
#multistage#malware, uploading on hybrid-analysis!? 2nd gen: https://www.hybrid-analysis.com/sample/9ed16d316e777e3825260dc9a7050d1c927dad684c76c84d2c196c7043e28b0e … Installs a#js#scriptlet as a service -> runs#NET (generated with#DotNetToJScript (demo app, not malicious). See 1st gen: https://twitter.com/DissectMalware/status/979968914645012481 …pic.twitter.com/xYy0HPejRk
Prikaži ovu nit -
#Lateral Movement Using#Outlook’s CreateObject#Method and#DotNetToJScript |@scoopit * http://sco.lt/70t1OL pic.twitter.com/Tvqs9ej5hb
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.