MythicAgents / sliver
Sliver agents for Mythic
☆38Updated 4 months ago
Alternatives and similar repositories for sliver:
Users that are interested in sliver are comparing it to the libraries listed below
- ☆54Updated 5 months ago
- ☆25Updated last week
- Sniffing files generator☆55Updated last month
- Cortex EDR Ransomware protection Bypass☆20Updated last month
- ☆54Updated last month
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 10 months ago
- ☆37Updated last month
- Nemesis agent for Mythic☆27Updated 7 months ago
- Lifetime AMSI bypass.☆35Updated 9 months ago
- Bloodhound agent for Mythic☆17Updated 7 months ago
- in-process powershell runner for BRC4☆45Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Situational Awareness script to identify how and where to run implants☆49Updated 3 months ago
- ☆54Updated 4 months ago
- Enumerate the Domain for Readable and Writable Shares☆17Updated last month
- malleable profile generator GUI for Havoc☆56Updated last year
- ☆49Updated 5 months ago
- A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike.☆13Updated 11 months ago
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆11Updated this week
- Tool to obtain hash using MS-SNTP for user accounts☆18Updated 2 months ago
- ☆17Updated 3 months ago
- This is my starred repositories including the description for each tool. Makes search/filter over them easier.☆42Updated last month
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- ☆47Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- ☆59Updated last year
- a simple poc showcasing the ability of an admin to suspend EDR's protected processes , making it useless☆38Updated 8 months ago