CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆109Updated 6 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆97Updated 10 months ago
- Addon for BHCE☆58Updated 10 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆163Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- Persist like a Dodder☆67Updated 8 months ago
- https://lolad-project.github.io/☆84Updated last year
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆166Updated 6 months ago
- Group Policy Objects manipulation and exploitation framework☆288Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆196Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆221Updated 9 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆264Updated 8 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 7 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆153Updated last month
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 10 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆206Updated last year
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆432Updated 3 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆350Updated 5 months ago
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆260Updated 3 months ago
- ☆332Updated 5 months ago
- ☆96Updated 6 months ago
- ☆139Updated 4 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Updated 3 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆111Updated 5 months ago
- Stealthy In-Memory Local Password Harvester (SILPH) tool: dump LSA, SAM and DCC2 with indirect syscall☆127Updated last month
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 8 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- ☆37Updated last year
- PoC that downloads an executable from a public SSL certificate☆136Updated 6 months ago