MythicAgents / sliverView external linksLinks
Sliver agents for Mythic
☆48Nov 18, 2024Updated last year
Alternatives and similar repositories for sliver
Users that are interested in sliver are comparing it to the libraries listed below
Sorting:
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 10 months ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Proof-of-Concept to evade auditd by tampering via ptrace☆18Aug 3, 2023Updated 2 years ago
- Rewrite to fit my needs☆32Jul 20, 2024Updated last year
- Sliver extension to bypass UAC via cmstp written in rust☆35Jun 4, 2024Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆63Mar 19, 2024Updated last year
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- ☆12Oct 10, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆52Oct 29, 2024Updated last year
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆204Aug 12, 2024Updated last year
- ☆59Oct 24, 2024Updated last year
- A Python POC for CRED1 over SOCKS5☆164Oct 5, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- Artifact monitoring that ensures fairplay☆79Jan 29, 2025Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- ☆11Nov 12, 2023Updated 2 years ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A python polymorphic engine for C programs☆12Dec 8, 2023Updated 2 years ago
- Implementation of USENIX'2024 paper "Racing for TLS Certificate Validation: A Hijacker’s Guide to the Android TLS Galaxy"☆19Apr 4, 2024Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- ☆18Oct 28, 2025Updated 3 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago