Discord C2 Profile for Mythic
☆32Feb 18, 2025Updated last year
Alternatives and similar repositories for discord
Users that are interested in discord are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 30, 2025Updated 2 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- ☆22Jan 2, 2026Updated 2 months ago
- Configurable, Community driven, HTTP C2 Profile☆28Feb 16, 2026Updated last month
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- SuperSharpShares is a tool designed to automate enumerating domain shares, allowing for quick verification of accessible shares by your a…☆75May 3, 2024Updated last year
- Websocket communications with Push and Poll messages☆20Oct 26, 2025Updated 4 months ago
- ☆219Updated this week
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆107Jan 26, 2026Updated last month
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A tech enumeration toolkit focused on 404 Not found pages.☆27Oct 6, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Simple HTTP async comms using standard GET/POST requests☆49Feb 5, 2026Updated last month
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆37Sep 14, 2023Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 3 weeks ago
- ☆59Oct 24, 2024Updated last year
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Jul 16, 2025Updated 8 months ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆31Mar 2, 2022Updated 4 years ago
- ☆210Nov 28, 2023Updated 2 years ago
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- ☆64Jan 2, 2024Updated 2 years ago
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆23Oct 29, 2020Updated 5 years ago
- Web File Manager☆11Aug 21, 2025Updated 7 months ago