MythicAgents / freyja
Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.
☆49Updated 2 months ago
Alternatives and similar repositories for freyja:
Users that are interested in freyja are comparing it to the libraries listed below
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆20Updated 3 years ago
- ☆29Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆42Updated 2 months ago
- ☆53Updated last year
- ☆17Updated last year
- ☆13Updated last year
- Continuous kerberoast monitor☆44Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆24Updated last year
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆24Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆59Updated 4 years ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Updated 3 years ago
- Nemesis agent for Mythic☆26Updated 4 months ago
- ☆16Updated 2 months ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated last year
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago
- Ansible role that Installs Mythic☆14Updated 6 months ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆46Updated 2 years ago