MythicAgents / poseidonLinks
Poseidon is a Golang agent targeting Linux and macOS
☆181Updated 3 weeks ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- A tool to find folders excluded from AV real-time scanning using a time oracle☆234Updated last year
- A Python gRPC Client Library for Sliver☆75Updated 5 months ago
- ☆209Updated 5 months ago
- Apply a divide and conquer approach to bypass EDRs☆288Updated last year
- ☆222Updated last year
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆317Updated 2 years ago
- Tools for analyzing EDR agents☆266Updated last year
- (Demo) 3rd party agent for Havoc☆144Updated 2 years ago
- Collection of random RedTeam scripts.☆208Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆152Updated last year
- The Official Sliver Armory☆116Updated 5 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆102Updated 5 months ago
- ☆300Updated 11 months ago
- ☆212Updated 3 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆336Updated last year
- ☆121Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Native Syscalls Shellcode Injector☆267Updated 2 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆193Updated last year
- Hide shellcode by shuffling bytes into a random array and reconstruct at runtime☆199Updated 6 months ago
- ☆170Updated last year
- ☆287Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆163Updated 9 months ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Updated 2 years ago
- ☆134Updated 2 years ago
- ☆152Updated 6 months ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆192Updated 10 months ago
- Command and Control (C2) framework☆131Updated 4 months ago