AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
β112Jul 21, 2025Updated 9 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 9 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 3 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.β44Jul 6, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalβ¦β94Jan 14, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Persist like a Dodderβ68May 19, 2025Updated 11 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, aloβ¦β92Aug 3, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16Apr 8, 2026Updated 3 weeks ago
- .NET tool used to enrich RPC telemetryβ102Jan 24, 2026Updated 3 months ago
- Addon for BHCEβ57Apr 1, 2025Updated last year
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.β¦β34Apr 22, 2026Updated last week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ99Apr 2, 2025Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.β25Updated this week
- An index of publicly available and open-source threat detection rulesets.β133Apr 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Locate dlls and function addresses without PEB Walk and EAT parsingβ104Nov 7, 2025Updated 5 months ago
- β23Mar 4, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2β91May 15, 2025Updated 11 months ago
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β111May 30, 2025Updated 10 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objectβ¦β415Updated this week
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- β52Dec 20, 2025Updated 4 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- β164Mar 20, 2026Updated last month
- Burp extension for Recursive Request Exploits (RRE) β DEFCON 2025β122Jan 30, 2026Updated 2 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β43Apr 3, 2026Updated 3 weeks ago
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.β107Apr 22, 2026Updated last week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β83Sep 11, 2025Updated 7 months ago
- β44Jul 17, 2025Updated 9 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.β42Apr 1, 2026Updated 3 weeks ago
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ105Feb 6, 2025Updated last year
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This code silently installs Chrome extensions on Mac, Windows, and Linuxβ160Jul 22, 2025Updated 9 months ago
- Alternative Read and Write primitives using Rtl* functions the unintended way.β79Aug 25, 2025Updated 8 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.β47Jun 10, 2025Updated 10 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated last month
- Red Team Collaboration Infrastructureβ97Apr 24, 2025Updated last year
- β39Jul 31, 2025Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year