MythicAgents / merlinLinks
Cross-platform post-exploitation HTTP Command & Control agent written in golang
☆108Updated 7 months ago
Alternatives and similar repositories for merlin
Users that are interested in merlin are comparing it to the libraries listed below
Sorting:
- ☆213Updated last month
- Collection of random RedTeam scripts.☆207Updated last year
- ☆223Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆150Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆122Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆105Updated 3 years ago
- (Demo) 3rd party agent for Havoc☆147Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆129Updated 2 years ago
- ☆84Updated 3 years ago
- ☆132Updated 2 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆72Updated 4 years ago
- An open-source process injection enumeration tool written in C#☆174Updated 2 years ago
- A C2 framework built for my bachelors thesis☆56Updated last week
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆137Updated 2 years ago
- Command and Control (C2) framework☆132Updated 6 months ago
- Cortex XDR Config Extractor☆135Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆122Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆200Updated 4 months ago
- Just some random Red Team Scripts that can be useful☆153Updated last year
- POC for frustrating/defeating Malware Analysts☆157Updated 3 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆133Updated 3 years ago
- ☆169Updated last year
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆87Updated 2 years ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆239Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆227Updated 2 years ago