MythicAgents / venusView external linksLinks
A Visual Studio Code Extension agent for Mythic C2
☆71Nov 5, 2024Updated last year
Alternatives and similar repositories for venus
Users that are interested in venus are comparing it to the libraries listed below
Sorting:
- ☆22Dec 30, 2025Updated last month
- ☆39Jul 29, 2021Updated 4 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Mythic Developer Series: Workshop Golang Agent☆26Jun 27, 2023Updated 2 years ago
- JavaScript for Automation (JXA) macOS agent☆90Feb 2, 2026Updated last week
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 4 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆203Aug 1, 2025Updated 6 months ago
- malware written for educational purposes☆71Dec 31, 2025Updated last month
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated last year
- Source for tasks I have used with Covenant☆122Mar 21, 2021Updated 4 years ago
- Run shellcode through InnoSetup code engine.☆74Jun 22, 2023Updated 2 years ago
- LiquidSnake is a tool that allows operators to perform fileless lateral movement using WMI Event Subscriptions and GadgetToJScript☆347Sep 1, 2021Updated 4 years ago
- Tool for interacting with outlook interop during red team engagements☆146Jun 29, 2021Updated 4 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Jan 31, 2025Updated last year
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- ☆185Jan 5, 2021Updated 5 years ago
- ☆22Jan 2, 2026Updated last month
- (kinda) Malicious Outlook Reader☆138Mar 3, 2021Updated 4 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Collection of macOS persistence methods and miscellaneous tools in JXA☆286Aug 3, 2023Updated 2 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆201Feb 2, 2026Updated last week
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆216Nov 6, 2025Updated 3 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Collection of VBA macro published in our twitter / blog☆160Sep 5, 2022Updated 3 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 3 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- Objective C dylibHijackScanner and analysis tool☆38Jul 12, 2023Updated 2 years ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆77Feb 8, 2023Updated 3 years ago
- C# Reflective loader for unmanaged binaries.☆447Jan 25, 2023Updated 3 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- ☆15May 26, 2021Updated 4 years ago