Repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation. These materials are presented from an attacker’s perspective with the goal of raising awareness to the risks of underestimating the security impact of No Code/Low Code. No Code/Low Code is awesome.

Features

  • Repurpose Microsoft-trusted executables
  • Repurpose service accounts
  • Repurpose cloud services
  • Power a malware operation
  • Set up your Power Pwn cloud environment
  • Infect a victim machine

Project Samples

Project Activity

See All Activity >

License

MIT License

Follow Power Pwn

Power Pwn Web Site

Other Useful Business Software
Forever Free Full-Stack Observability | Grafana Cloud Icon
Forever Free Full-Stack Observability | Grafana Cloud

Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Power Pwn!

Additional Project Details

Programming Language

Python

Related Categories

Python Robotic Process Automation (RPA) Tool

Registered

2023-06-12