V1V1 / OffensiveAutoItLinks
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
☆445Updated 3 years ago
Alternatives and similar repositories for OffensiveAutoIt
Users that are interested in OffensiveAutoIt are comparing it to the libraries listed below
Sorting:
- Create fake certs for binaries using windows binaries and the power of bat files☆568Updated last year
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 3 years ago
- A unique technique to execute binaries from a password protected zip☆1,031Updated 3 years ago
- The Token Stealer☆502Updated 3 years ago
- NTLM relaying for Windows made easy☆573Updated 2 years ago
- PowerShell Script Obfuscator☆570Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Updated 2 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆495Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆845Updated 3 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆688Updated 3 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆792Updated 5 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆473Updated last year
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,151Updated 4 years ago
- Get file less command execution for lateral movement.☆629Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,137Updated last month
- Self-developed tools for Lateral Movement/Code Execution☆715Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]☆614Updated 3 years ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆774Updated last year
- PoCs and tools for investigation of Windows process execution techniques☆934Updated last month
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,006Updated 3 years ago
- Fork of SafetyKatz that dynamically fetches the latest pre-compiled release of Mimikatz directly from gentilkiwi GitHub repo, runtime pat…☆876Updated 4 years ago
- some gadgets about windows process and ready to use :)☆608Updated 2 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 3 years ago
- Red Team C code repo☆563Updated 9 months ago
- This repo covers some code execution and AV Evasion methods for Macros in Office documents☆1,252Updated 3 years ago
- Manipulating and Abusing Windows Access Tokens.☆282Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,489Updated last year
- An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting…☆1,051Updated 3 years ago
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆339Updated 3 years ago