MythicAgents / sliverLinks
Sliver agents for Mythic
☆40Updated 7 months ago
Alternatives and similar repositories for sliver
Users that are interested in sliver are comparing it to the libraries listed below
Sorting:
- ☆55Updated 8 months ago
- .NET tool used to enrich RPC telemetry☆62Updated last week
- Tool to aid in dumping LSASS process remotely☆40Updated 10 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- ☆56Updated 4 months ago
- ☆59Updated last year
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆50Updated 5 months ago
- Sniffing files generator☆58Updated 4 months ago
- ☆38Updated 4 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆43Updated last month
- ☆25Updated 3 months ago
- A python script that automates a C2 Profile build☆42Updated 3 months ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆48Updated 6 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 3 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆52Updated 2 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆32Updated 8 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆38Updated 5 months ago
- ☆50Updated 3 weeks ago
- Proxy function calls through the thread pool with ease☆28Updated 3 months ago
- SAM Dumping in C#☆48Updated 5 months ago
- BOF for C2 framework☆41Updated 7 months ago
- ☆50Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated last year
- ☆48Updated 2 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆37Updated this week
- This repository focuses on replicating the behavioral patterns observed in well-documented APT campaigns.☆12Updated 3 weeks ago
- ☆22Updated 3 months ago