CroodSolutions / AutoPwnKey
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆25Updated this week
Alternatives and similar repositories for AutoPwnKey:
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
- DEFCON 31 slide deck and video link☆58Updated 9 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- ☆74Updated 3 weeks ago
- A simple tool designed to create Atomic Red Team tests with ease.☆39Updated last month
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated 10 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆78Updated 7 months ago
- ☆23Updated last month
- ☆33Updated 4 months ago
- ☆24Updated 2 years ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆35Updated 3 months ago
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆34Updated last year
- ☆88Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆121Updated last year
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 5 months ago
- ☆52Updated 7 months ago
- Living Off Security Tools☆45Updated 5 months ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆36Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆165Updated 6 months ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- A collection of CVEs weaponized by ransomware operators☆112Updated last month
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆136Updated last month
- A collection of art inspired by the world of cybersecurity and hacking culture.☆34Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 2 months ago
- My Notes from Hugging Face AI Agents Course☆12Updated last month
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆72Updated 2 weeks ago
- bowing to the AI Overlords.☆22Updated 3 months ago
- An introduction to detection engineering☆13Updated 3 months ago
- msuserstats is a comprehensive Powershell tool to manage accounts from Microsoft Entra ID and Active Directory. It supports: a unified vi…☆41Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- ☆80Updated 4 months ago