D00MFist / Mystikal
macOS Initial Access Payload Generator
☆305Updated last year
Alternatives and similar repositories for Mystikal:
Users that are interested in Mystikal are comparing it to the libraries listed below
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆148Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆274Updated last year
- macOS persistence tool☆224Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆277Updated 6 months ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆170Updated 2 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- Swift 5 macOS agent☆105Updated 9 months ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆167Updated 5 months ago
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆329Updated 3 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆129Updated 2 years ago
- ☆383Updated 4 years ago
- ☆98Updated 4 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 4 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆332Updated 3 years ago
- ☆208Updated 3 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆326Updated 9 months ago
- Malicious Shortcut(.lnk) Generator☆193Updated 6 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆388Updated last year
- ☆188Updated 2 years ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆384Updated last month
- AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Co…☆220Updated 4 years ago
- ☆83Updated last year
- Tools for discovery and abuse of COM hijacks☆305Updated 5 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆424Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆232Updated 3 years ago
- Collection of beacon BOF written to learn windows and cobaltstrike☆347Updated 2 years ago
- ☆113Updated 3 weeks ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆485Updated last year
- Dll that can be used for side loading and other attack vector.☆202Updated 4 years ago
- ☆198Updated this week