Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
☆21Apr 29, 2021Updated 4 years ago
Alternatives and similar repositories for AutoWin
Users that are interested in AutoWin are comparing it to the libraries listed below
Sorting:
- ☆22Jan 2, 2026Updated 2 months ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- CVE-2020–9934 POC☆23Jul 28, 2020Updated 5 years ago
- A curated list of browser fuzzing researches, papers, tools, ...☆14Jan 30, 2023Updated 3 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆22Sep 27, 2020Updated 5 years ago
- LOCAL AND REMOTE HOOK msv1_0!SpAcceptCredentials from LSASS.exe and DUMP DOMAIN/LOGIN/PASSWORD IN CLEARTEXT to text file.☆123Jan 27, 2020Updated 6 years ago
- Code coverage calculation/monitoring tool for Corpus Distillation☆16Aug 25, 2016Updated 9 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- PRISM Autonomous Experimentation Group☆13May 2, 2017Updated 8 years ago
- Library for Dissect and Infect ELF Binaries.☆40Apr 27, 2025Updated 10 months ago
- macOS keylogger, clipboard monitor, and screenshotter☆92Sep 1, 2021Updated 4 years ago
- async mass DNS resolver☆86Feb 9, 2024Updated 2 years ago
- Visual Studio (C++) Solution Template for Payloads☆18Oct 30, 2019Updated 6 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Decrypt stored WinSCP Passwords.☆24May 4, 2015Updated 10 years ago
- Where CTFs happen☆82May 30, 2024Updated last year
- lair-docker-compose repo☆17Mar 11, 2021Updated 5 years ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 4 months ago
- Reference material for fuzzing and creating fuzzers☆19Apr 6, 2019Updated 6 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- This code was used for the blogpost on secjuice.☆43Apr 17, 2019Updated 6 years ago
- WinAFL modified for RDP client fuzzing☆20Dec 18, 2022Updated 3 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Sep 8, 2023Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- pyForgeCert is a Python equivalent of the ForgeCert.☆69Aug 15, 2023Updated 2 years ago
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Oct 28, 2020Updated 5 years ago
- Lsass dumper evading (all ?) EDR detection☆49Nov 10, 2025Updated 4 months ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago