MythicAgents / zippyLinks
A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support for OpenGL 2.1 is currently required by Godot.
☆11Updated last year
Alternatives and similar repositories for zippy
Users that are interested in zippy are comparing it to the libraries listed below
Sorting:
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 2 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Nemesis agent for Mythic☆27Updated 10 months ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- Kibana app for RedELK☆17Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- A tool to sync mythic events with ghostwriter oplog.☆13Updated 7 months ago
- Password spray wrapper for OpenConnect VPN client☆11Updated 4 years ago
- ☆18Updated last year
- ☆20Updated 5 years ago
- Assists in mass exportation of Nessus scans☆21Updated 7 years ago
- ☆11Updated 4 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- ☆15Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Updated 3 years ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 3 years ago
- Bloodhound agent for Mythic☆21Updated 2 months ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated 2 years ago
- ☆14Updated 3 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Updated 5 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 2 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago