D00MFist / MystikalLinks
macOS Initial Access Payload Generator
☆315Updated last year
Alternatives and similar repositories for Mystikal
Users that are interested in Mystikal are comparing it to the libraries listed below
Sorting:
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆152Updated 2 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆283Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆186Updated 10 months ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆179Updated 2 years ago
- macOS persistence tool☆226Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Updated 11 months ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆338Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆194Updated 2 months ago
- Swift 5 macOS agent☆110Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- List of Awesome macOS Red Teaming Resources.☆236Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆343Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 5 years ago
- ☆193Updated 3 years ago
- easy-to-use payload hosting☆272Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆218Updated 3 years ago
- ☆402Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated last month
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆421Updated 3 years ago
- macOS Offensive Tools☆271Updated 2 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆233Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆85Updated 4 months ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆243Updated 5 years ago
- Run Rubeus via Rundll32☆200Updated 5 years ago
- Fully asynchronous SMB library written in pure python☆214Updated 3 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆236Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆298Updated 2 years ago