

Hosts the CLR, patches AMSI & ETW and executes a.


Hosts the CLR, bypasses AMSI & executes PowerShell through an unmanaged runspace. The scripts are intended to be compiled and used as standalone console application executables but it's not the only way they can be utilized. The examples in this repo are purely PoCs I've tested them, but not thoroughly. I love byt3bl33d3r's OffensiveNim repo and wanted to have a go at developing/researching tradecraft in a language that I wasn't familiar with.Very active community and countless user defined functions (UDFs).Simplifies UI automation and interaction GUI creation, simulating keystrokes and mouse movements, manipulating windows and processes.Scripts can be executed using AutoIt3.exe (digitally signed binary) or compiled into standalone executables.Ability to directly call external DLL and Windows API functions.Plenty of examples online showing AutoIt being utilized for malware development but no general resource I could find that security folk new to the language can use to explore its capabilities and nuances.Using scripts without compilation into executables.Compiling scripts into standalone executables.Offensive tooling notes and experiments in AutoIt v3.
