MythicC2Profiles / httpxLinks
Configurable, Community driven, HTTP C2 Profile
☆27Updated 7 months ago
Alternatives and similar repositories for httpx
Users that are interested in httpx are comparing it to the libraries listed below
Sorting:
- Ansible role that Installs Mythic☆18Updated last year
- ☆18Updated 2 years ago
- ☆13Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆21Updated 5 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆25Updated 3 years ago
- ☆19Updated 5 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- Nemesis agent for Mythic☆28Updated last month
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Updated last year
- Finding SSL Blindspots for Red Teams☆34Updated 5 years ago
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- ☆16Updated last month
- Ansible role to deploy RedELK server☆19Updated 2 years ago
- Modified version of PEAS client for offensive operations☆42Updated 3 years ago
- Firebase Domain Front Code☆21Updated 4 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Updated 5 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- Caesar-Cipher based encryption☆29Updated 4 years ago
- ☆27Updated 4 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 5 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- ☆20Updated 5 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Updated last month
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated last month