A Visual Studio Code Extension agent for Mythic C2
☆72Nov 5, 2024Updated last year
Alternatives and similar repositories for venus
Users that are interested in venus are comparing it to the libraries listed below
Sorting:
- ☆22Dec 30, 2025Updated 2 months ago
- ☆39Jul 29, 2021Updated 4 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆95Feb 19, 2026Updated 2 weeks ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆201Aug 1, 2025Updated 7 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated 2 years ago
- Source for tasks I have used with Covenant☆121Mar 21, 2021Updated 4 years ago
- Run shellcode through InnoSetup code engine.☆74Jun 22, 2023Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆345Sep 1, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- ☆22Jan 2, 2026Updated 2 months ago
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 5 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆288Aug 3, 2023Updated 2 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆205Feb 27, 2026Updated last week
- ☆218Feb 20, 2026Updated 2 weeks ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Collection of VBA macro published in our twitter / blog☆158Sep 5, 2022Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Objective C dylibHijackScanner and analysis tool☆40Jul 12, 2023Updated 2 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆446Jan 25, 2023Updated 3 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 2 years ago