Notion C2 Profile for Mythic
☆45Apr 30, 2026Updated this week
Alternatives and similar repositories for Notion
Users that are interested in Notion are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆80Apr 11, 2026Updated 3 weeks ago
- load arbitrary dlls, call any exported function, calls execute inside g0 as normal syscalls do from the traditional route, no syscall or …☆28Feb 18, 2026Updated 2 months ago
- ☆24Sep 6, 2025Updated 7 months ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆46Aug 10, 2025Updated 8 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Azure apim mini proxy☆56Feb 16, 2026Updated 2 months ago
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆140Apr 26, 2026Updated last week
- ClickForClickOnce - Generate configurable clickonce payloads☆93Apr 17, 2026Updated 2 weeks ago
- ☆28Mar 14, 2026Updated last month
- Novel Windows process injection: assembles existing open handles (process & thread), natural RWX regions, and special user APC (NtQueueAp…☆70Feb 17, 2026Updated 2 months ago
- ASPX Web Shell with COFF Loader☆129Mar 10, 2026Updated last month
- Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions☆69Nov 15, 2025Updated 5 months ago
- Linux Shared Library to Shellcode Loader☆95Feb 15, 2026Updated 2 months ago
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆92Feb 9, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆57Mar 2, 2026Updated 2 months ago
- A BloodHound collector written in Go that discovers Linux and SSH attack paths. Outputs OpenGraph JSON and integrates with existing Sharp…☆85Apr 25, 2026Updated last week
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 8 months ago
- ☆39Mar 28, 2025Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆44Nov 4, 2025Updated 6 months ago
- Logging tool intended for red team usage☆38Dec 5, 2025Updated 4 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 3 months ago
- ☆50Nov 26, 2025Updated 5 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- TLS fingerprint emulation upstream proxy replay any ClientHello☆46Apr 6, 2026Updated 3 weeks ago
- Nim implementation for sud0Ru's Credential Dumping from SAM/SECURITY Hives Method (a.k.a. SilentHarvest)☆104Apr 4, 2026Updated last month
- Opengraph-Compatible JSON Generator for BloodHound☆28Mar 30, 2026Updated last month
- Boot-to-Breach red team lab on AWS. Mythic, Sliver, and Havoc C2 behind a production-style Apache redirector. Deployed via Terraform, to …☆220Updated this week
- ☆228Mar 13, 2026Updated last month
- ☆26Mar 24, 2026Updated last month
- Async BOF implementation of 'Rubeus monitor' to detect and automatically extract Kerberos TGTs as they appear on a target system.☆116Apr 22, 2026Updated last week
- ☆52Mar 30, 2026Updated last month
- Mini-program Cross Page Request Forgery (MiniCPRF) Analysis Tool.☆18Oct 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆244Apr 26, 2026Updated last week
- Using call gadgets to break the call stack signature used by Elastic on proxying a module load. Provided as a Crystal Palace shared libra…☆83Nov 6, 2025Updated 5 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆67Jan 10, 2025Updated last year
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connecti…☆453Nov 3, 2025Updated 6 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 3 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 9 months ago