MythicAgents / nemesis
Nemesis agent for Mythic
☆24Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for nemesis
- Bloodhound agent for Mythic☆14Updated 2 months ago
- Scripts to interact with Microsoft Graph APIs☆31Updated this week
- PoC MSI payload based on ASEC/AhnLab's blog post☆22Updated 2 years ago
- A simple to use single-include Windows API resolver☆17Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 5 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆29Updated 5 months ago
- Extract registry and NTDS secrets from local or remote disk images☆28Updated 2 months ago
- ☆40Updated last week
- Python3 rewrite of AsOutsider features of AADInternals☆36Updated last month
- ☆13Updated last month
- ☆23Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆27Updated last year
- Smuggle a file to a user's browser☆18Updated 2 years ago
- ☆15Updated last year
- Discord C2 Profile for Mythic☆24Updated 6 months ago
- Bypassing Amsi using LdrLoadDll☆20Updated 2 weeks ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆10Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Items related to the RedELK workshop given at security conferences☆27Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆18Updated 11 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆27Updated 6 months ago
- Ansible role that Installs Mythic☆14Updated 4 months ago
- A vSphere deployment of GOADv2 BETA Testing (v0.1)☆26Updated 10 months ago
- Modified version of PEAS client for offensive operations☆38Updated last year
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆32Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆13Updated last year
- time-based user enum via Basic Auth in Azure☆28Updated last month
- Extension functionality for the NightHawk operator client☆26Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆18Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆26Updated last week