MythicC2Profiles / httpxLinks
Configurable, Community driven, HTTP C2 Profile
☆27Updated 8 months ago
Alternatives and similar repositories for httpx
Users that are interested in httpx are comparing it to the libraries listed below
Sorting:
- Ansible role that Installs Mythic☆19Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- ☆18Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- Nemesis agent for Mythic☆28Updated last month
- Top hashpwn rules☆21Updated last month
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- ☆13Updated 4 years ago
- ☆16Updated 2 months ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Caesar-Cipher based encryption☆29Updated 4 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- Ansible role to deploy RedELK server☆19Updated 2 years ago
- Items related to the RedELK workshop given at security conferences☆29Updated 2 years ago
- Automatically deploy Nemesis☆21Updated last year
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 3 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 3 years ago
- Discord C2 Profile for Mythic☆33Updated 11 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago