D00MFist / MystikalLinks
macOS Initial Access Payload Generator
☆318Updated last year
Alternatives and similar repositories for Mystikal
Users that are interested in Mystikal are comparing it to the libraries listed below
Sorting:
- Tracking of offensive macOS tooling, blogs, and related helpful information☆189Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆283Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆151Updated 2 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆339Updated 3 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆189Updated 2 years ago
- Swift 5 macOS agent☆113Updated last year
- macOS Offensive Tools☆271Updated 2 years ago
- macOS persistence tool☆227Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Updated last year
- JavaScript for Automation (JXA) macOS agent☆88Updated last week
- List of Awesome macOS Red Teaming Resources.☆239Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆200Updated 4 months ago
- ☆194Updated 3 years ago
- ☆426Updated 3 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆344Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆432Updated 3 years ago
- easy-to-use payload hosting☆274Updated 3 years ago
- Tools for discovery and abuse of COM hijacks☆330Updated 6 years ago
- ☆117Updated 8 months ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆386Updated 3 years ago
- Bring your own print driver privilege escalation tool☆260Updated 4 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Updated 3 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Fully modular persistence framework☆257Updated 2 years ago
- ☆406Updated 4 years ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆192Updated 4 years ago
- ☆209Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- Malicious Shortcut(.lnk) Generator☆199Updated 7 years ago