AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments
☆31Sep 17, 2025Updated 6 months ago
Alternatives and similar repositories for AWSDoor
Users that are interested in AWSDoor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Updated this week
- ☆48Dec 5, 2025Updated 4 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- ☆13Jun 26, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 7 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 4 months ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 8 months ago
- Bypassing Amsi using LdrLoadDll☆48Jan 8, 2025Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- ☆14Mar 19, 2024Updated 2 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An offensive toolkit for restless guests #DEFCON33☆54Aug 11, 2025Updated 8 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 11 months ago
- The DCERPC only printerbug.py version☆214Oct 30, 2025Updated 5 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- ☆41Sep 9, 2023Updated 2 years ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated last month
- PowerShell collector for adding SCCM attack paths to BloodHound with OpenGraph☆83Apr 6, 2026Updated last week
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 3 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆57Feb 16, 2025Updated last year
- Payload Generation Workflow☆41Jul 18, 2025Updated 8 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆368Sep 3, 2025Updated 7 months ago
- ☆65Mar 15, 2024Updated 2 years ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆57Jun 14, 2023Updated 2 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Read ETW Provider events. Inspired by ETWExplorer by Pavel Yosifovich☆18Jun 29, 2024Updated last year
- ☆142Sep 9, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- Permanently disable EDRs as local admin☆129Dec 19, 2025Updated 3 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- .NET port of Leron Gray's azbelt tool.☆26Sep 21, 2023Updated 2 years ago