MythicAgents / Athena
☆191Updated last week
Alternatives and similar repositories for Athena:
Users that are interested in Athena are comparing it to the libraries listed below
- Patching AmsiOpenSession by forcing an error branching☆143Updated last year
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆295Updated 2 years ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆252Updated last year
- A BOF to automate common persistence tasks for red teamers☆273Updated last year
- (Demo) 3rd party agent for Havoc☆133Updated last year
- COM Hijacking VOODOO☆261Updated this week
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆321Updated 11 months ago
- Patch AMSI and ETW☆236Updated 9 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆322Updated 7 months ago
- ☆219Updated last year
- PoC module to demonstrate automated lateral movement with the Havoc C2 framework.☆287Updated last year
- A Stealthy Lsass Dumper - can abuse ProcExp152.sys driver to dump PPL Lsass, no dbghelp.lib calls.☆318Updated 2 years ago
- ☆297Updated last year
- ☆159Updated 6 months ago
- Shellcode launcher for AV bypass☆217Updated last year
- POC for frustrating/defeating Malware Analysts☆154Updated 2 years ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆226Updated 2 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆283Updated last year
- ☆180Updated last year
- Creating a repository with all public Beacon Object Files (BoFs)☆458Updated last year
- Proof of concept Beacon Object File (BOF) that uses static x64 syscalls to perform a complete in memory dump of a process and send that b…☆238Updated 3 years ago
- COFF file (BOF) for managing Kerberos tickets.☆289Updated last year
- Hookers are cooler than patches.☆168Updated 3 years ago
- Recovering NTLM hashes from Credential Guard☆332Updated 2 years ago
- A new AMSI Bypass technique using .NET ALI Call Hooking.☆186Updated 2 years ago
- Run Your Payload Without Running Your Payload☆180Updated 2 years ago
- Infect Shared Files In Memory for Lateral Movement☆193Updated 2 years ago
- Generate an obfuscated DLL that will disable AMSI & ETW☆316Updated 7 months ago
- Kill AV/EDR leveraging BYOVD attack☆339Updated last year