CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆110Updated 5 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- Addon for BHCE☆58Updated 8 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 8 months ago
- Persist like a Dodder☆66Updated 7 months ago
- ☆164Updated last month
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 5 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆150Updated 4 months ago
- Group Policy Objects manipulation and exploitation framework☆282Updated 3 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆88Updated last month
- ☆133Updated 3 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 6 months ago
- https://lolad-project.github.io/☆84Updated 11 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Updated 9 months ago
- A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily☆243Updated last week
- A community-driven collection of BloodHound queries☆158Updated this week
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 6 months ago
- ☆95Updated 4 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆213Updated this week
- Advanced Domain Controller attack and credential analysis tool leveraging DonPAPI database☆256Updated last month
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆78Updated 3 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆102Updated 10 months ago
- The different ways to dump lsass☆202Updated 4 months ago
- ☆151Updated 2 months ago
- PoC that downloads an executable from a public SSL certificate☆136Updated 5 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆262Updated 7 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆206Updated 3 months ago
- Azure Post Exploitation Framework☆243Updated 2 months ago