MythicAgents / poseidonLinks
Poseidon is a Golang agent targeting Linux and macOS
☆186Updated last week
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- ☆213Updated last month
- A Python gRPC Client Library for Sliver☆78Updated 8 months ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- Apply a divide and conquer approach to bypass EDRs☆287Updated 2 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆107Updated 7 months ago
- ☆223Updated 2 years ago
- (Demo) 3rd party agent for Havoc☆147Updated 2 years ago
- Tools for analyzing EDR agents☆271Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆318Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆170Updated 2 years ago
- ☆315Updated 2 years ago
- ☆227Updated 6 months ago
- The Official Sliver Armory☆121Updated 7 months ago
- ☆302Updated last year
- Collection of random RedTeam scripts.☆207Updated last year
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆128Updated 2 years ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆397Updated 5 months ago
- Simple EDR implementation to demonstrate bypass☆182Updated 5 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Native Syscalls Shellcode Injector☆267Updated 2 years ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- Malware As A Service☆135Updated last year
- Hookers are cooler than patches.☆170Updated 3 years ago
- ☆203Updated 2 years ago
- ☆169Updated last year
- ☆153Updated 8 months ago
- ☆120Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆151Updated last year
- Fully modular persistence framework☆257Updated 2 years ago
- C# POC to extract NetNTLMv1/v2 hashes from ETW provider☆260Updated 2 years ago