MythicAgents / merlinLinks
Cross-platform post-exploitation HTTP Command & Control agent written in golang
☆104Updated 6 months ago
Alternatives and similar repositories for merlin
Users that are interested in merlin are comparing it to the libraries listed below
Sorting:
- Collection of random RedTeam scripts.☆207Updated last year
- ☆210Updated 5 months ago
- Patching AmsiOpenSession by forcing an error branching☆148Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated 11 months ago
- ☆222Updated 2 years ago
- A collection of Cobalt Strike Aggressor scripts.☆103Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆164Updated 10 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- An open-source process injection enumeration tool written in C#☆173Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- C2 Automation using Linode☆85Updated 3 years ago
- ☆132Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆136Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆197Updated 3 months ago
- ☆84Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆125Updated 2 years ago
- ☆71Updated 7 months ago
- The most average C2 ever (MACE)☆97Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆74Updated 3 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- (Demo) 3rd party agent for Havoc☆145Updated 2 years ago
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- ☆109Updated 11 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- ☆170Updated last year
- Small project to facilitate creation of .lnk payloads☆74Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆152Updated last year
- The Official Sliver Armory☆118Updated 6 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago