Repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation. These materials are presented from an attacker’s perspective with the goal of raising awareness to the risks of underestimating the security impact of No Code/Low Code. No Code/Low Code is awesome.

Features

  • Repurpose Microsoft-trusted executables
  • Repurpose service accounts
  • Repurpose cloud services
  • Power a malware operation
  • Set up your Power Pwn cloud environment
  • Infect a victim machine

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow Power Pwn

Power Pwn Web Site

Other Useful Business Software
Build Securely on AWS with Proven Frameworks Icon
Build Securely on AWS with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Power Pwn!

Additional Project Details

Programming Language

Python

Related Categories

Python Robotic Process Automation (RPA) Tool

Registered

2023-06-12