Known colloquially as LOLBAS, these are executables and scripts that come as part of Windows but allow for arbitrary code execution. They allow us to bypass AppLocker, because they're allowed to execute under the normal allow criteria - they exist in trusted paths (C:\Windows and C:\Program Files) and may also be digitally signed by Microsoft.
The contains hundreds of examples that can be utilised. Let's use as a demo - if not blocked, it can be used to execute arbitrary C# code from a .csproj or .xml file.
This could be turned into a basic shellcode injector.
You can use http_x64.xprocess.bin here and host it on the Cobalt Strike Team Server via Site Management > Host File.