# Code Execution

- [CMSTP](/redteam/weapon/code-execution/cmstp.md)
- [MSBuild](/redteam/weapon/code-execution/msbuild.md)
- [MSHTA](/redteam/weapon/code-execution/mshta.md)
- [Microsoft Office Execution](/redteam/weapon/code-execution/microsoft-office-execution.md)
- [Windows Script Host (WSH)](/redteam/weapon/code-execution/wsh.md)
- [Outlook Home Page Abuse (Specula)](/redteam/weapon/code-execution/outlook-home-page-abuse-specula.md)
- [Powershell Without Powershell.exe](/redteam/weapon/code-execution/whithout-powershell.md)
- [RegSrv32](/redteam/weapon/code-execution/regsrv32.md)
- [Scheduled Tasks](/redteam/weapon/code-execution/scheduled-tasks.md): MITRE ATT\&CK™  Scheduled Task/Job  - Technique T1053.002
- [Services](/redteam/weapon/code-execution/services.md): MITRE ATT\&CK™   System Services - Service Execution  - Technique T1569.002
- [Windows Library Files](/redteam/weapon/code-execution/windows-library-files.md)
- [HTML Help Files](/redteam/weapon/code-execution/html-help-files.md)
- [WMI](/redteam/weapon/code-execution/wmic.md): MITRE ATT\&CK™  Windows Management Instrumentation - Technique T1047
- [Script Exploits](/redteam/weapon/code-execution/script-exploits.md)
- [Sliver](/redteam/weapon/code-execution/sliver.md)
