MythicAgents / apfellLinks
JavaScript for Automation (JXA) macOS agent
☆80Updated last month
Alternatives and similar repositories for apfell
Users that are interested in apfell are comparing it to the libraries listed below
Sorting:
- Swift 5 macOS agent☆106Updated 10 months ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- LDAP Querying without the Suck☆102Updated 6 months ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- ☆120Updated 2 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- ☆98Updated 4 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 7 months ago
- So, you think you have MFA? AAD/ROPC/MFA bypass testing tool☆111Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆57Updated 7 months ago
- ☆69Updated last year
- A Visual Studio Code Extension agent for Mythic C2☆70Updated 6 months ago
- If you have any questions, please open an issue.☆24Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆121Updated 8 months ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆47Updated 6 months ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆44Updated last year
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆117Updated last year
- ☆38Updated last year
- ☆88Updated 2 years ago
- A proof-of-concept malicious Chrome extension☆79Updated 2 years ago
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- Get Fine Grained Password Policy☆70Updated last month
- ☆182Updated 6 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆124Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆93Updated last year
- AAD related enumeration in Nim☆129Updated last year