Skip to content
#

mshta-exploitation

Here is 1 public repository matching this topic...

This case study analyzed a stealthy host-based compromise in which the attacker exploited the trusted Windows binary mshta.exe to execute a remotely hosted, obfuscated JavaScript payload. The attacker’s strategy was notable not for brute force or privilege escalation, but for quiet persistence and clever abuse of native system behavior.

  • Updated May 10, 2025
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the mshta-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the mshta-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more