V1V1 / OffensiveAutoItLinks
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
☆448Updated 3 years ago
Alternatives and similar repositories for OffensiveAutoIt
Users that are interested in OffensiveAutoIt are comparing it to the libraries listed below
Sorting:
- Create fake certs for binaries using windows binaries and the power of bat files☆571Updated last year
- some gadgets about windows process and ready to use :)☆610Updated 2 years ago
- A unique technique to execute binaries from a password protected zip☆1,039Updated 3 years ago
- The Token Stealer☆510Updated 3 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Updated 3 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Updated 2 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆502Updated 4 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 4 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆688Updated 3 years ago
- NTLM relaying for Windows made easy☆579Updated 2 years ago
- Encrypted PE Loader Generator☆545Updated 4 years ago
- ☆345Updated 4 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆486Updated last year
- Red Team C code repo☆569Updated last year
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆338Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆720Updated 4 years ago
- Manipulating and Abusing Windows Access Tokens.☆287Updated 5 years ago
- Killing your preferred antimalware by abusing native symbolic links and NT paths.☆358Updated 4 years ago
- Get file less command execution for lateral movement.☆634Updated 3 years ago
- A tool for generating fake code signing certificates or signing real ones☆958Updated 2 years ago
- Small and convenient C2 tool for Windows targets☆612Updated 3 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆865Updated 2 years ago
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- KaynLdr is a Reflective Loader written in C/ASM☆555Updated 2 years ago
- Process Ghosting - a PE injection technique, similar to Process Doppelgänging, but using a delete-pending file instead of a transacted fi…☆681Updated last year
- ☆777Updated 2 years ago
- PoCs and tools for investigation of Windows process execution techniques☆953Updated last week
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,497Updated 2 years ago
- collection of apis used in malware development☆230Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 4 years ago