AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
β111Jul 21, 2025Updated 8 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 8 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.β44Jul 6, 2025Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalβ¦β94Jan 14, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Persist like a Dodderβ68May 19, 2025Updated 10 months ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, aloβ¦β92Aug 3, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 4 months ago
- .NET tool used to enrich RPC telemetryβ101Jan 24, 2026Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates β¦β124Jul 19, 2025Updated 8 months ago
- Addon for BHCEβ57Apr 1, 2025Updated last year
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.β¦β31Updated this week
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ98Apr 2, 2025Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.β23Feb 23, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- Locate dlls and function addresses without PEB Walk and EAT parsingβ105Nov 7, 2025Updated 5 months ago
- β23Mar 4, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2β89May 15, 2025Updated 10 months ago
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β112May 30, 2025Updated 10 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objectβ¦β391Mar 27, 2026Updated last week
- An OpenAI API Compatible Honeypot Gatewayβ17Mar 17, 2025Updated last year
- β52Dec 20, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated 11 months ago
- β164Mar 20, 2026Updated 2 weeks ago
- Burp extension for Recursive Request Exploits (RRE) β DEFCON 2025β122Jan 30, 2026Updated 2 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Updated this week
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β83Sep 11, 2025Updated 6 months ago
- β44Jul 17, 2025Updated 8 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.β41Apr 1, 2026Updated last week
- This code silently installs Chrome extensions on Mac, Windows, and Linuxβ156Jul 22, 2025Updated 8 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ105Feb 6, 2025Updated last year
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- Alternative Read and Write primitives using Rtl* functions the unintended way.β78Aug 25, 2025Updated 7 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.β47Jun 10, 2025Updated 9 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated 2 weeks ago
- Red Team Collaboration Infrastructureβ98Apr 24, 2025Updated 11 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hackeβ¦β79Feb 7, 2026Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year