MythicAgents / hercules
Mythic Developer Series: Workshop Golang Agent
☆21Updated last year
Related projects: ⓘ
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated last year
- ☆51Updated 3 years ago
- GhostLoader - AppDomainManager - Injection - 攻壳机动队☆50Updated 4 years ago
- ☆23Updated 3 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆64Updated 2 months ago
- terraform deployment for red team☆19Updated last year
- D/Invoke port of UrbanBishop☆29Updated 3 years ago
- ☆13Updated 8 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆47Updated 3 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆15Updated 4 months ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆35Updated 3 years ago
- ☆15Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- Ansible role that Installs Mythic☆14Updated 2 months ago
- ☆14Updated 2 weeks ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆26Updated 3 years ago
- ☆11Updated this week
- ☆36Updated 4 months ago
- The repository that complements the From zero to hero: creating a reflective loader in C# workshop☆37Updated 2 years ago
- ☆17Updated last year
- ☆13Updated 11 months ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆22Updated 2 years ago
- Nemesis agent for Mythic☆23Updated 3 weeks ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆29Updated 2 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆39Updated 4 years ago
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- ☆47Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 2 years ago