D00MFist / MystikalLinks
macOS Initial Access Payload Generator
☆318Updated last year
Alternatives and similar repositories for Mystikal
Users that are interested in Mystikal are comparing it to the libraries listed below
Sorting:
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆153Updated 2 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆189Updated last year
- Collection of macOS persistence methods and miscellaneous tools in JXA☆284Updated 2 years ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆182Updated 2 years ago
- Swift 5 macOS agent☆112Updated last year
- A macOS enumeration tool inspired by harmjoy's Windows-based Seatbelt enumeration tool. Author: Cedric Owens☆339Updated 3 years ago
- macOS persistence tool☆226Updated 3 years ago
- Python interpreter for Cobalt Strike Malleable C2 Profiles. Allows you to parse, build and modify them programmatically.☆281Updated last year
- List of Awesome macOS Red Teaming Resources.☆239Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆199Updated 3 months ago
- macOS Offensive Tools☆272Updated 2 years ago
- easy-to-use payload hosting☆274Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆421Updated 3 years ago
- Malicious Shortcut(.lnk) Generator☆198Updated 7 years ago
- ☆403Updated 4 years ago
- ☆194Updated 3 years ago
- Tools for discovery and abuse of COM hijacks☆330Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆237Updated 3 years ago
- An interactive command prompt for red teaming and pentesting. Automatically pushes commands through SOCKS4/5 proxies via proxychains. Opt…☆220Updated 3 years ago
- JavaScript for Automation (JXA) macOS agent☆88Updated last month
- Proof-of-concept obfuscation toolkit for C# post-exploitation tools☆433Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆235Updated 2 years ago
- Shellcode runner in GO that incorporates shellcode encryption, remote process injection, block dlls, and spoofed parent process☆232Updated 5 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆343Updated 4 years ago
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆247Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Updated 3 months ago
- Fully asynchronous SMB library written in pure python☆215Updated 2 weeks ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆258Updated 3 years ago