3ndG4me / AgentSmith
Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin
☆16Updated 4 years ago
Alternatives and similar repositories for AgentSmith:
Users that are interested in AgentSmith are comparing it to the libraries listed below
- Red Team Infrastructure: Covenant C2☆10Updated 4 years ago
- ☆11Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆17Updated 2 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆13Updated 3 years ago
- A collection of my presentation materials.☆16Updated 10 months ago
- A tool to sync mythic events with ghostwriter oplog.☆12Updated 3 months ago
- Firebase Domain Front Code☆21Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- WMI SA stuffs☆29Updated 2 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆24Updated 4 years ago
- ☆2Updated 2 months ago
- ☆17Updated 4 years ago
- ☆17Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆18Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆27Updated 5 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Kibana app for RedELK☆16Updated last year
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- ☆24Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 8 months ago