CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆99Updated 2 weeks ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆91Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 9 months ago
- Persist like a Dodder☆62Updated 2 months ago
- Addon for BHCE☆50Updated 4 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆203Updated 3 months ago
- ☆163Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 4 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆120Updated 2 weeks ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated last month
- https://lolad-project.github.io/☆80Updated 7 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆96Updated 6 months ago
- Living Off Security Tools☆45Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆126Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆89Updated 11 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆191Updated last year
- Python alternative to Mimikatz lsadump::dcshadow☆144Updated last month
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 2 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆250Updated 2 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆229Updated 2 months ago
- A community-driven collection of BloodHound queries☆111Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated last week
- C2 writen in Rust & Go powered by Tor network.☆122Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 5 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- Azure Post Exploitation Framework☆203Updated 5 months ago
- ☆104Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆206Updated 4 months ago
- BloodHound-MCP-AI is integration that connects BloodHound with AI through Model Context Protocol, allowing security professionals to anal…☆249Updated 2 months ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- ☆205Updated last month