MythicAgents / freyja
Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.
☆52Updated 4 months ago
Alternatives and similar repositories for freyja:
Users that are interested in freyja are comparing it to the libraries listed below
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- ☆54Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- ☆30Updated 2 years ago
- ☆52Updated last year
- Modified version of PEAS client for offensive operations☆39Updated 2 years ago
- A collection of tools Neil and Andy have been working on released in one place and interlinked with previous tools☆87Updated last year
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- ☆17Updated 4 months ago
- Continuous kerberoast monitor☆44Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 10 months ago
- ☆24Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 4 months ago
- ☆15Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 5 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 4 years ago
- Find Inbound Email Domains☆22Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- Microsoft365 Device Code Phishing Framework☆36Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- ☆26Updated last year
- ☆45Updated last week
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 3 weeks ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- ☆37Updated 10 months ago
- A list of commands, tools and notes about enumerating and exploiting Active Directory and how to defend against these attacks☆20Updated 3 years ago