MythicAgents / nemesis
Nemesis agent for Mythic
☆26Updated 4 months ago
Alternatives and similar repositories for nemesis:
Users that are interested in nemesis are comparing it to the libraries listed below
- Bloodhound agent for Mythic☆16Updated 4 months ago
- Scripts to interact with Microsoft Graph APIs☆32Updated 2 months ago
- Mythic C2 wrapper for NimSyscallPacker☆22Updated last month
- Tool for issuing manual LDAP queries which offers bofhound compatible output☆17Updated 3 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- ☆16Updated 3 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- A simple to use single-include Windows API resolver☆19Updated 6 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆16Updated 2 months ago
- ☆13Updated last year
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆34Updated 4 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆31Updated 7 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated last year
- fully async implementation of Dirkjan's ROADTools☆31Updated 10 months ago
- ☆17Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆39Updated 3 weeks ago
- Ansible role that Installs Mythic☆14Updated 6 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆53Updated 2 years ago
- ☆2Updated last month
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆28Updated 3 years ago
- My BloodHound custom queries☆23Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆51Updated 8 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆37Updated 11 months ago
- Modified version of PEAS client for offensive operations☆38Updated 2 years ago