Infiltr8: The Red-Book
search
⌘Ctrlk
Infiltr8ForumGitHub
Infiltr8: The Red-Book
  • The Red-Book
  • Red-Teaming
    • Reconnaissance
    • Execution
      • Code & Process Injection
      • Code Execution
        • CMSTP
        • MSBuild
        • MSHTA
        • Microsoft Office Execution
        • Windows Script Host (WSH)
        • Outlook Home Page Abuse (Specula)
        • Powershell Without Powershell.exe
        • RegSrv32
        • Scheduled Tasks
        • Services
        • Windows Library Files
        • HTML Help Files
        • WMI
        • Script Exploits
        • 🛠️Sliver
    • Initial Access
    • Persistence
    • Defense Evasion
    • Discovery
    • Privilege Escalation
    • Credential Access
    • Lateral Movement
    • Exfiltration
  • Web Pentesting
    • Reconnaissance
    • Infrastructures
    • Web Vulnerabilities
  • Network Pentesting
    • Network services
    • WiFi
    • Bluetooth
  • Active Directory Pentesting
    • Reconnaissance
    • Movement
    • Persistence
  • Smart Contracts Pentesting
    • On-Chain Analysis
    • Smart Contract Vulnerabilities
  • Cloud & CI/CD Pentesting
    • Kubernetes
    • CI/CD
    • Azure Pentesting
    • 🛠️GCP Pentesting
    • 🛠️AWS Pentesting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Red-Teamingchevron-right
  2. Execution

Code Execution

CMSTPchevron-rightMSBuildchevron-rightMSHTAchevron-rightMicrosoft Office Executionchevron-rightWindows Script Host (WSH)chevron-rightOutlook Home Page Abuse (Specula)chevron-rightPowershell Without Powershell.exechevron-rightRegSrv32chevron-rightScheduled Taskschevron-rightServiceschevron-rightWindows Library Fileschevron-rightHTML Help Fileschevron-rightWMIchevron-rightScript Exploitschevron-right🛠️Sliverchevron-right

Last updated 1 month ago