CroodSolutions / AutoPwnKeyLinks
AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. It is our hope that this tool will be useful to red teams over the short term, while over the long term help AV/EDR vendors improve how they handle AHK scripts.
☆107Updated last month
Alternatives and similar repositories for AutoPwnKey
Users that are interested in AutoPwnKey are comparing it to the libraries listed below
Sorting:
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 11 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆93Updated 5 months ago
- Persist like a Dodder☆64Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated last month
- Addon for BHCE☆55Updated 5 months ago
- ☆162Updated 4 months ago
- Python alternative to Mimikatz lsadump::dcshadow☆154Updated 2 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆208Updated 5 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆150Updated 9 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 3 months ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆191Updated 10 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆145Updated last month
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆243Updated 3 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆194Updated last year
- Group Policy Objects manipulation and exploitation framework☆243Updated 3 weeks ago
- Founding is a generator that will create a loader encrypted or obfuscated with different execution types☆89Updated 3 weeks ago
- gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory env…☆272Updated 2 weeks ago
- https://lolad-project.github.io/☆81Updated 8 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆304Updated 2 weeks ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Updated 6 months ago
- A community-driven collection of BloodHound queries☆138Updated last week
- The different ways to dump lsass☆116Updated last month
- ☆284Updated 3 weeks ago
- Azure Post Exploitation Framework☆213Updated last week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆132Updated 7 months ago
- An Ansible role that install the Adaptix C2 server and/or client on Debian based hosts☆165Updated 3 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated 3 weeks ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆210Updated 5 months ago