MythicAgents / apfellLinks
JavaScript for Automation (JXA) macOS agent
☆85Updated 3 weeks ago
Alternatives and similar repositories for apfell
Users that are interested in apfell are comparing it to the libraries listed below
Sorting:
- Swift 5 macOS agent☆111Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆61Updated last year
- Tracking of offensive macOS tooling, blogs, and related helpful information☆188Updated 11 months ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆50Updated 11 months ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Updated 3 years ago
- macOS shellcode loader written in Objective-C☆49Updated 3 years ago
- ☆70Updated 2 years ago
- A proof-of-concept malicious Chrome extension☆83Updated 3 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆153Updated 2 years ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆45Updated 2 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Updated 11 months ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- ☆59Updated 2 years ago
- ☆67Updated 3 years ago
- Abuse Azure API permissions for red teaming☆68Updated 2 years ago
- ☆43Updated 3 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆98Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Living Off the Foreign Land setup scripts☆72Updated 8 months ago
- ☆37Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 7 months ago
- Interact with Chromium-based browsers' debug port to view open tabs, installed extensions, and cookies☆180Updated 2 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆80Updated 3 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆88Updated 2 years ago
- ☆121Updated 3 years ago
- LDAP Querying without the Suck☆110Updated 11 months ago