GhostManager / mythic_syncLinks
Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+
☆22Updated 6 months ago
Alternatives and similar repositories for mythic_sync
Users that are interested in mythic_sync are comparing it to the libraries listed below
Sorting:
- Ansible role that Installs Mythic☆19Updated last year
- ☆15Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Updated 5 years ago
- ☆27Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆44Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 3 years ago
- Nemesis agent for Mythic☆28Updated last month
- ☆23Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆14Updated 2 years ago
- ☆14Updated last year
- terraform deployment for red team☆26Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Updated last year
- ☆18Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- fully async implementation of Dirkjan's ROADTools☆34Updated 10 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Updated 5 months ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month
- Continuous kerberoast monitor☆45Updated 2 years ago
- ☆13Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated 2 months ago
- Caesar-Cipher based encryption☆29Updated 4 years ago
- ☆28Updated 5 years ago
- ☆33Updated 5 years ago
- ☆24Updated 3 years ago