D00MFist / Mystikal
macOS Initial Access Payload Generator
☆299Updated last year
Alternatives and similar repositories for Mystikal:
Users that are interested in Mystikal are comparing it to the libraries listed below
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆143Updated last year
- Swift 5 macOS agent☆101Updated 6 months ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆271Updated 3 months ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆266Updated last year
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆164Updated last year
- macOS persistence tool☆221Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆157Updated 2 months ago
- macOS Offensive Tools☆265Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆329Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆328Updated 3 years ago
- ☆185Updated 2 years ago
- ☆358Updated 3 years ago
- ☆99Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆231Updated 11 months ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated last year
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆228Updated 4 years ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆253Updated 3 years ago
- Dump ntds.dit really fast☆379Updated 3 years ago
- Load any Beacon Object File using Powershell!☆246Updated 3 years ago
- Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.☆349Updated last year
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆468Updated last year
- A modular C2 framework☆424Updated this week
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆168Updated 4 years ago
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆416Updated 2 years ago
- ☆186Updated last week
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆241Updated 4 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆93Updated 4 months ago
- ☆409Updated 2 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆128Updated last week
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆219Updated 5 years ago