V1V1 / OffensiveAutoItLinks
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
☆448Updated 3 years ago
Alternatives and similar repositories for OffensiveAutoIt
Users that are interested in OffensiveAutoIt are comparing it to the libraries listed below
Sorting:
- Create fake certs for binaries using windows binaries and the power of bat files☆570Updated last year
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆524Updated 4 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆843Updated 3 years ago
- some gadgets about windows process and ready to use :)☆610Updated 2 years ago
- A unique technique to execute binaries from a password protected zip☆1,039Updated 3 years ago
- The Token Stealer☆510Updated 3 years ago
- Encrypted PE Loader Generator☆545Updated 4 years ago
- Self-developed tools for Lateral Movement/Code Execution☆719Updated 4 years ago
- A small POC to make defender useless by removing its token privileges and lowering the token integrity☆688Updated 3 years ago
- Project for identifying executables and DLLs vulnerable to relative path DLL hijacking.☆486Updated last year
- Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.☆515Updated 5 years ago
- Red Team C code repo☆569Updated last year
- Project Ares is a Proof of Concept (PoC) loader written in C/C++ based on the Transacted Hollowing technique☆338Updated 4 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Updated 2 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆502Updated 4 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆1,163Updated 4 years ago
- A tool for generating fake code signing certificates or signing real ones☆958Updated 2 years ago
- ☆345Updated 4 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,234Updated 2 years ago
- Manipulating and Abusing Windows Access Tokens.☆287Updated 5 years ago
- Template-Driven AV/EDR Evasion Framework☆1,769Updated 2 years ago
- A tool to escalate privileges in an active directory network by coercing authenticate from machine accounts and relaying to the certifica…☆864Updated 2 years ago
- A C2 post-exploitation framework☆483Updated 2 years ago
- My collection of battle-tested Aggressor Scripts for Cobalt Strike 4.0+☆1,097Updated 2 years ago
- Get file less command execution for lateral movement.☆635Updated 3 years ago
- DLL and PowerShell script to assist with finding DLL hijacks☆340Updated 5 years ago
- NTLM relaying for Windows made easy☆578Updated 2 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,042Updated 3 months ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,496Updated 2 years ago