MythicAgents / apfellLinks
JavaScript for Automation (JXA) macOS agent
☆84Updated 2 weeks ago
Alternatives and similar repositories for apfell
Users that are interested in apfell are comparing it to the libraries listed below
Sorting:
- Swift 5 macOS agent☆106Updated 11 months ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆39Updated 3 years ago
- LDAP Querying without the Suck☆104Updated 7 months ago
- ☆69Updated last year
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- macOS shellcode loader written in Objective-C☆47Updated 2 years ago
- Objective-C library and console to interact with Heimdal APIs for macOS Kerberos☆150Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated last year
- ☆120Updated 3 years ago
- Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers☆122Updated 9 months ago
- Rust in-memory dumper☆108Updated last year
- DEFCON30 Talk Material, References and Extra Bits☆39Updated 2 years ago
- Leak NTLM via Website tab in teams via MS Office☆78Updated last year
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆58Updated 7 months ago
- ☆98Updated 4 years ago
- Some scripts to support with importing large datasets into BloodHound☆80Updated last year
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆47Updated 2 years ago
- A CLI for deploying red team infrastructure across mutliple cloud providers, all integrated with a virtual Nebula network, and full ELK i…☆117Updated last year
- Living off the land searches for explorer and sharepoint☆86Updated last month
- Abuse Azure API permissions for red teaming☆67Updated 2 years ago
- AAD related enumeration in Nim☆129Updated last year
- If you have any questions, please open an issue.☆24Updated 3 years ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆19Updated 5 months ago
- A proof of concept for a clickjacking attack on macOS.☆95Updated last year
- using graph proxy to monitor teams user presence☆54Updated 11 months ago
- ☆38Updated last year
- ☆35Updated 7 months ago
- Living Off the Foreign Land setup scripts☆70Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago