# Code Execution

* [regsvr32](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/regsvr32)
* [MSHTA](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/mshta)
* [Control Panel Item](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/control-panel-item)
* [Executing Code as a Control Panel Item through an Exported Cplapplet Function](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/executing-code-as-a-control-panel)
* [Code Execution through Control Panel Add-ins](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/code-execution-through-control-panel-add-ins)
* [CMSTP](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/cmstp)
* [InstallUtil](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/installutil)
* [Using MSBuild to Execute Shellcode in C#](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/using-msbuild-to-execute-shellcode-in-c)
* [Forfiles Indirect Command Execution](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/forfiles-indirect-command-execution)
* [Application Whitelisting Bypass with WMIC and XSL](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/application-whitelisting-bypass-with-wmic-and-xsl)
* [Powershell Without Powershell.exe](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/powershell-without-powershell.exe)
* [Powershell Constrained Language Mode Bypass](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/powershell-constrained-language-mode-bypass)
* [Forcing Iexplore.exe to Load a Malicious DLL via COM Abuse](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/forcing-iexplore.exe)
* [pubprn.vbs Signed Script Code Execution](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/pubprn.vbs-signed-script-code-execution)
* [PreviousNetNTLMv2 hash stealing using Outlook](https://www.ired.team/offensive-security/initial-access/netntlmv2-hash-stealing-using-outlook)
* [Nextregsvr32](https://hamcodes.gitbook.io/hackersnotes/offensive-security/code-execution/regsvr32)
