Repurpose Microsoft-trusted executables, service accounts and cloud services to power a malware operation. These materials are presented from an attacker’s perspective with the goal of raising awareness to the risks of underestimating the security impact of No Code/Low Code. No Code/Low Code is awesome.
Features
- Repurpose Microsoft-trusted executables
- Repurpose service accounts
- Repurpose cloud services
- Power a malware operation
- Set up your Power Pwn cloud environment
- Infect a victim machine
Categories
Robotic Process Automation (RPA)License
MIT LicenseFollow Power Pwn
Other Useful Business Software
Build Securely on AWS with Proven Frameworks
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of Power Pwn!