Reduati / AutoWinLinks
Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.
☆20Updated 4 years ago
Alternatives and similar repositories for AutoWin
Users that are interested in AutoWin are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆117Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆43Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 8 months ago
- ☆54Updated 4 years ago
- Anonymize your hashcat formatted files for online cracking☆31Updated 10 months ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- Some random tools I use for penetration testing☆91Updated 4 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆58Updated 4 years ago
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆123Updated 2 years ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆37Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆61Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆63Updated 5 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆93Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 3 years ago
- offensive notes & resources☆43Updated 4 months ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago