IncideDigital / Mistica
An open source swiss army knife for arbitrary communication over application protocols
☆239Updated 4 years ago
Alternatives and similar repositories for Mistica:
Users that are interested in Mistica are comparing it to the libraries listed below
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆210Updated 4 years ago
- ATTPwn☆212Updated last year
- A modular C2 framework☆448Updated 2 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆228Updated 4 years ago
- ☆259Updated last year
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆516Updated 2 years ago
- ☆333Updated 2 years ago
- Information released publicly by NCC Group's Full Spectrum Attack Simulation (FSAS) team.☆609Updated 2 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Updated last year
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆478Updated 9 months ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆341Updated 4 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆251Updated last year
- Physmem2profit can be used to create a minidump of a target hosts' LSASS process by analysing physical memory remotely☆414Updated 2 years ago
- Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP/Shellcode/SILENTTRINITY and AV bypass, AMSI patched☆579Updated 5 years ago
- Toolbox containing research notes & PoC code for weaponizing .NET's DLR☆520Updated 3 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆759Updated 4 years ago
- A Cobalt Strike tool to audit Active Directory user accounts for weak, well known or easy guessable passwords.☆434Updated 3 years ago
- LDAP library for auditing MS AD☆410Updated 2 weeks ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆373Updated 3 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆221Updated 4 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆792Updated 2 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆313Updated last year
- Analyze ARP requests to identify intercommunicating hosts and stale network address configurations (SNACs)☆66Updated 3 years ago
- Active Directory ACL exploitation with BloodHound☆718Updated 3 years ago
- Excel Macro Document Reader/Writer for Red Teamers & Analysts☆518Updated 3 years ago
- Open source pre-operation C2 server based on python and powershell☆749Updated 3 years ago
- Kerberoast attack -pure python-☆427Updated last year
- ☆167Updated 7 years ago
- ☆381Updated 3 weeks ago
- PoC of a VBA macro spawning a process with a spoofed parent and command line.☆380Updated 4 years ago