MythicAgents / bloodhoundView external linksLinks
Bloodhound agent for Mythic
☆24Apr 19, 2025Updated 9 months ago
Alternatives and similar repositories for bloodhound
Users that are interested in bloodhound are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- ☆22Dec 30, 2025Updated last month
- ☆22Jun 9, 2025Updated 8 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- rust port of pspy with support for process monitoring over dbus☆35Jan 4, 2026Updated last month
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆62Oct 29, 2024Updated last year
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated last year
- JavaScript for Automation (JXA) macOS agent☆91Feb 2, 2026Updated 2 weeks ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Jan 23, 2024Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆201Feb 2, 2026Updated 2 weeks ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- ☆13Jun 27, 2024Updated last year
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 4 months ago
- A persistent database + CLI for your BBOT scan data 🧡☆40Updated this week
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆22Jul 31, 2025Updated 6 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- ☆29Sep 4, 2024Updated last year
- Event Data Collector☆40Jan 12, 2026Updated last month
- ☆14Mar 19, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- ☆26Mar 11, 2025Updated 11 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 10 months ago
- ☆41Feb 20, 2025Updated 11 months ago
- Decrypt mRemoteNG passwords☆65May 10, 2022Updated 3 years ago
- Putting the C2 in C2loudflare☆18Jun 28, 2024Updated last year
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Indirect syscalls + DInvoke made simple.☆96Dec 24, 2024Updated last year