D00MFist / Mystikal
macOS Initial Access Payload Generator
☆301Updated last year
Alternatives and similar repositories for Mystikal:
Users that are interested in Mystikal are comparing it to the libraries listed below
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆272Updated 4 months ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆146Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆166Updated last year
- Swift 5 macOS agent☆101Updated 7 months ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆269Updated last year
- Tracking of offensive macOS tooling, blogs, and related helpful information☆159Updated 3 months ago
- macOS persistence tool☆221Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆232Updated last year
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆229Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆417Updated 2 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆331Updated 2 years ago
- macOS Offensive Tools☆265Updated last year
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- ☆363Updated 3 years ago
- ☆188Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆170Updated last week
- ☆99Updated 4 years ago
- Tools for discovery and abuse of COM hijacks☆300Updated 5 years ago
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆410Updated 2 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆385Updated 11 months ago
- Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.☆184Updated 4 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆329Updated 3 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆254Updated 3 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆238Updated 3 years ago
- FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads☆383Updated 2 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆257Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆222Updated 3 years ago
- ☆411Updated 2 years ago
- ☆186Updated last year