MythicAgents / bloodhound
Bloodhound agent for Mythic
☆14Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for bloodhound
- Nemesis agent for Mythic☆24Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆31Updated this week
- Sliver agents for Mythic☆35Updated 6 months ago
- ☆40Updated last week
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- Extract registry and NTDS secrets from local or remote disk images☆28Updated 2 months ago
- ☆13Updated last month
- fully async implementation of Dirkjan's ROADTools☆31Updated 8 months ago
- Ansible role that Installs Mythic☆14Updated 4 months ago
- A simple to use single-include Windows API resolver☆17Updated 4 months ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- Find Inbound Email Domains☆21Updated 10 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated 9 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆36Updated 6 months ago
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated 10 months ago
- ☆17Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- ☆43Updated 4 months ago
- time-based user enum via Basic Auth in Azure☆28Updated last month
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- ☆13Updated last month
- ☆15Updated last year