V1V1 / OffensiveAutoItLinks
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
☆444Updated 3 years ago
Alternatives and similar repositories for OffensiveAutoIt
Users that are interested in OffensiveAutoIt are comparing it to the libraries listed below
Sorting:
- Create fake certs for binaries using windows binaries and the power of bat files☆567Updated last year
- A unique technique to execute binaries from a password protected zip☆1,030Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆523Updated 3 years ago
- The Token Stealer☆500Updated 3 years ago
- some gadgets about windows process and ready to use :)☆611Updated last year
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆855Updated 2 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆746Updated last year
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆689Updated 3 years ago
- NTLM relaying for Windows made easy☆569Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,148Updated 4 years ago
- ☆344Updated 3 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆984Updated 2 months ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Updated 2 years ago
- Encrypted PE Loader Generator☆543Updated 4 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆513Updated 4 years ago
- A C2 post-exploitation framework☆478Updated last year
- Self-developed tools for Lateral Movement/Code Execution☆711Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 3 years ago
- Manipulating and Abusing Windows Access Tokens.☆279Updated 4 years ago
- Red Team C code repo☆556Updated 7 months ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆363Updated 3 years ago
- Adaptive DLL hijacking / dynamic export forwarding☆779Updated 5 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆472Updated last year
- ☆416Updated 2 years ago
- Get file less command execution for lateral movement.☆626Updated 3 years ago
- Some usefull Scripts and Executables for Pentest & Forensics☆1,134Updated last month
- A simple python packer to easily bypass Windows Defender☆644Updated 3 years ago
- This repo covers some code execution and AV Evasion methods for Macros in Office documents☆1,247Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆493Updated 3 years ago
- Porting of mimikatz sekurlsa::logonpasswords, sekurlsa::ekeys and lsadump::dcsync commands☆1,005Updated 3 years ago