CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆85Updated 2 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆90Updated 2 months ago
- Persist like a Dodder☆61Updated last month
- ☆161Updated 2 months ago
- A tool to work with all types of Kerberos delegations (unconstrained, constrained, and resource-based constrained delegations) in Active …☆180Updated 3 weeks ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆80Updated 9 months ago
- Addon for BHCE☆47Updated 2 months ago
- SoaPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆231Updated 4 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated this week
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Azure Post Exploitation Framework☆200Updated 4 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆224Updated 3 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆124Updated 5 months ago
- ☆201Updated 2 weeks ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆198Updated 2 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 3 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 6 months ago
- ☆102Updated 2 months ago
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆173Updated last month
- Tool to extract username and password of current user from PanGPA in plaintext☆85Updated 6 months ago
- A tool leveraging Kerberos tickets to get Microsoft 365 access tokens using Seamless SSO☆176Updated 10 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 6 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆234Updated last month
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆179Updated 2 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆159Updated last month
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- ☆182Updated last month
- Generate and Manage KeyCredentialLinks☆160Updated 3 weeks ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago