GhostManager / Ghostwriter_CLILinks
Golang CLI binary used for installing and managing Ghostwriter
☆19Updated 3 weeks ago
Alternatives and similar repositories for Ghostwriter_CLI
Users that are interested in Ghostwriter_CLI are comparing it to the libraries listed below
Sorting:
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- List accounts with Service Principal Names (SPN) not linked to active dns records in an Active Directory Domain.☆22Updated 5 months ago
- Nemesis agent for Mythic☆27Updated 10 months ago
- Ansible role that Installs Mythic☆18Updated last year
- ☆31Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 months ago
- ☆15Updated 2 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆31Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Updated 2 years ago
- ☆18Updated last year
- ☆33Updated 5 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Updated 2 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15Updated 2 years ago
- ☆18Updated last month
- A user enumeration tool for Slack.☆30Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- ☆3Updated 7 months ago
- A tool to enumerate and download files from the System Center Configuration Manager (SCCM) SMB share (SCCMContentLib)☆13Updated 11 months ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- wsnet☆26Updated last month
- Discord C2 Profile for Mythic☆30Updated 5 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year