AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
β112Jul 21, 2025Updated 9 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many portsβ61Jul 13, 2025Updated 10 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β56Apr 26, 2026Updated 3 weeks ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.β44Jul 6, 2025Updated 10 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 3 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalβ¦β93Jan 14, 2026Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Persist like a Dodderβ68May 19, 2025Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, aloβ¦β92Aug 3, 2025Updated 9 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16May 2, 2026Updated 2 weeks ago
- .NET tool used to enrich RPC telemetryβ102Jan 24, 2026Updated 3 months ago
- Addon for BHCEβ57Apr 1, 2025Updated last year
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.β¦β35Apr 22, 2026Updated 3 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ100Apr 2, 2025Updated last year
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.β27Updated this week
- An index of publicly available and open-source threat detection rulesets.β135Apr 17, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Locate dlls and function addresses without PEB Walk and EAT parsingβ105Nov 7, 2025Updated 6 months ago
- β24Mar 4, 2025Updated last year
- Utilizng an MCP Server to communicate with your C2β92May 15, 2025Updated last year
- BlueSky OSINT Toolβ15Dec 10, 2024Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.β113May 30, 2025Updated 11 months ago
- An OpenAI API Compatible Honeypot Gatewayβ22Mar 17, 2025Updated last year
- β54Apr 27, 2026Updated 3 weeks ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged objectβ¦β422Apr 24, 2026Updated 3 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β45Apr 21, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- β165Mar 20, 2026Updated last month
- Burp extension for Recursive Request Exploits (RRE) β DEFCON 2025β121Jan 30, 2026Updated 3 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β44May 8, 2026Updated last week
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.β120Apr 22, 2026Updated 3 weeks ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β83Sep 11, 2025Updated 8 months ago
- β44Jul 17, 2025Updated 10 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.β43Apr 1, 2026Updated last month
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ106Feb 6, 2025Updated last year
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Alternative Read and Write primitives using Rtl* functions the unintended way.β79Aug 25, 2025Updated 8 months ago
- This code silently installs Chrome extensions on Mac, Windows, and Linuxβ162Jul 22, 2025Updated 9 months ago
- Rust implementation, creating a scheduled task programmatically with user logon trigger.β47Jun 10, 2025Updated 11 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptioβ¦β20Mar 22, 2026Updated last month
- Red Team Collaboration Infrastructureβ97Apr 24, 2025Updated last year
- β39Jul 31, 2025Updated 9 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β133Mar 26, 2025Updated last year