D00MFist / MystikalLinks
macOS Initial Access Payload Generator
☆307Updated last year
Alternatives and similar repositories for Mystikal
Users that are interested in Mystikal are comparing it to the libraries listed below
Sorting:
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆173Updated 2 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆277Updated last year
- ☆388Updated 4 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆173Updated 6 months ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆279Updated 7 months ago
- macOS persistence tool☆225Updated 3 years ago
- Swift 5 macOS agent☆106Updated 10 months ago
- ☆98Updated 4 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆418Updated 2 years ago
- ☆189Updated 2 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆257Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆227Updated 2 years ago
- Tools for discovery and abuse of COM hijacks☆310Updated 5 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆424Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- Recon-AD, an AD recon tool based on ADSI and reflective DLL’s☆329Updated 5 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆338Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆193Updated 6 years ago
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆222Updated 4 years ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆328Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆389Updated last year
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆231Updated last year
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆215Updated 2 years ago
- ☆162Updated 2 years ago
- ☆352Updated last year
- The idea is to collect all the C# projects that are Sharp{Word} that can be used in Cobalt Strike as execute assembly command.☆478Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆330Updated 10 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago