AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments
☆30Sep 17, 2025Updated 5 months ago
Alternatives and similar repositories for AWSDoor
Users that are interested in AWSDoor are comparing it to the libraries listed below
Sorting:
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆23Feb 23, 2026Updated last week
- ☆12Jun 26, 2023Updated 2 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- ☆58Feb 16, 2025Updated last year
- ☆48Dec 5, 2025Updated 2 months ago
- ☆14Mar 19, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- Executing Shellcode with ReadDirectoryChanges’s Hidden Callback☆30Oct 13, 2025Updated 4 months ago
- ☆65Mar 15, 2024Updated last year
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 4 months ago
- Permanently disable EDRs as local admin☆127Dec 19, 2025Updated 2 months ago
- Easy to use, open-source infrastructure management platform, crafted specifically for red team engagements.☆109Feb 16, 2026Updated 2 weeks ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆17Dec 23, 2024Updated last year
- Bypassing Amsi using LdrLoadDll☆47Jan 8, 2025Updated last year
- Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a s…☆50Feb 23, 2026Updated last week
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 8 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆46Feb 23, 2026Updated last week
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Request device ticket/token using the device's MSA☆38Aug 25, 2025Updated 6 months ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- rust port of pspy with support for process monitoring over dbus☆36Jan 4, 2026Updated 2 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆24May 11, 2025Updated 9 months ago
- LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment…☆359Sep 3, 2025Updated 6 months ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Dec 7, 2025Updated 2 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆54May 12, 2025Updated 9 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆155Dec 5, 2025Updated 3 months ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- C2 writen in Rust & Go powered by Tor network.☆152Oct 30, 2025Updated 4 months ago