CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆109Updated 5 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 9 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- Persist like a Dodder☆67Updated 7 months ago
- Addon for BHCE☆58Updated 9 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- ☆163Updated last month
- Group Policy Objects manipulation and exploitation framework☆284Updated last month
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 10 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 5 months ago
- The different ways to dump lsass☆204Updated 5 months ago
- A community-driven collection of BloodHound queries☆159Updated last week
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆205Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆258Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆91Updated last week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- ☆95Updated 5 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆220Updated 9 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- ☆133Updated 4 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆152Updated 3 weeks ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- Living Off Security Tools☆58Updated last month
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 4 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆111Updated 4 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆263Updated 8 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year