MythicC2Profiles / dnsLinks
☆20Updated 3 weeks ago
Alternatives and similar repositories for dns
Users that are interested in dns are comparing it to the libraries listed below
Sorting:
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- ☆25Updated 4 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆48Updated 8 months ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆96Updated last year
- terraform deployment for red team☆25Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 4 months ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Living Off the Foreign Land setup scripts☆70Updated 5 months ago
- ☆72Updated last month
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- ☆39Updated last year
- ☆19Updated 8 months ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- ☆58Updated 2 years ago
- Artificially inflate a given binary to exceed common EDR file size limits. Can be used to bypass common EDR.☆120Updated 3 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Updated 2 years ago
- ☆27Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆36Updated last year
- ☆89Updated 3 years ago
- ☆57Updated 2 years ago
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆92Updated 2 years ago
- Dump objects from .NET dumps.☆51Updated 3 years ago
- Random☆34Updated 2 years ago
- ☆13Updated last year
- Exchangelib wrapper for pentesting☆64Updated 5 months ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆128Updated 2 years ago
- ☆107Updated last year