CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆107Updated 2 months ago
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 6 months ago
- Addon for BHCE☆53Updated 6 months ago
- Persist like a Dodder☆64Updated 4 months ago
- ☆164Updated 5 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 11 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last month
- ☆75Updated 2 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆153Updated 3 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆146Updated 2 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128Updated last year
- https://lolad-project.github.io/☆81Updated 9 months ago
- Group Policy Objects manipulation and exploitation framework☆253Updated this week
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 10 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆116Updated 3 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆90Updated last year
- ☆115Updated 3 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆94Updated last month
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆282Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆152Updated 2 weeks ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆314Updated last month
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆214Updated 5 months ago
- ☆130Updated this week
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆99Updated 8 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- ☆106Updated 3 months ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆245Updated 4 months ago
- ☆322Updated last month