MythicAgents / poseidonLinks
Poseidon is a Golang agent targeting Linux and macOS
☆167Updated 3 weeks ago
Alternatives and similar repositories for poseidon
Users that are interested in poseidon are comparing it to the libraries listed below
Sorting:
- ☆203Updated 2 months ago
- Apply a divide and conquer approach to bypass EDRs☆280Updated last year
- ☆221Updated last year
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Updated last year
- A Python gRPC Client Library for Sliver☆70Updated 3 months ago
- (Demo) 3rd party agent for Havoc☆140Updated last year
- Tools for analyzing EDR agents☆232Updated last year
- ☆305Updated 2 years ago
- ShellWasp is a tool to help build shellcode that utilizes Windows syscalls, while overcoming the portability problem associated with Wind…☆164Updated last year
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆98Updated 2 months ago
- The Official Sliver Armory☆110Updated 2 months ago
- Native Syscalls Shellcode Injector☆266Updated 2 years ago
- 「💀」Proof of concept on BYOVD attack☆161Updated 7 months ago
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Fully modular persistence framework☆256Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆173Updated 5 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆188Updated 9 months ago
- A proof-of-concept Cobalt Strike Reflective Loader which aims to recreate, integrate, and enhance Cobalt Strike's evasion features!☆331Updated 11 months ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆185Updated 3 months ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆314Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆124Updated last year
- ☆113Updated 3 years ago
- ☆201Updated last month
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆141Updated 10 months ago
- Start with shellcode execution using Windows APIs (high level), move on to native APIs (medium level) and finally to direct syscalls (low…☆133Updated 2 years ago
- ☆146Updated 3 months ago
- WNF Code Execution Library Using C#☆111Updated 5 years ago
- ☆167Updated 11 months ago
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆232Updated last year
- ☆301Updated 8 months ago