MythicC2Profiles / httpxLinks
Configurable, Community driven, HTTP C2 Profile
☆17Updated 2 months ago
Alternatives and similar repositories for httpx
Users that are interested in httpx are comparing it to the libraries listed below
Sorting:
- Nemesis agent for Mythic☆27Updated 9 months ago
- ☆3Updated 5 months ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆18Updated 3 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- Simple reverse ICMP shell☆14Updated last year
- Ansible role that Installs Mythic☆15Updated 11 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 3 months ago
- ☆18Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 11 months ago
- ☆17Updated 7 months ago
- Golang Implementation of Hell's gate☆17Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆25Updated 3 years ago
- Strategy for building a Red Team☆17Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- C# project to Reflectively load .Net assemblies in memory☆17Updated 11 months ago
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 2 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆19Updated 2 months ago
- A small example of loading BOFs in Python with pure reflection☆19Updated 2 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- ☆14Updated 3 years ago
- ☆30Updated last week
- OSED Practice binary☆24Updated last year
- Smuggle a file to a user's browser☆20Updated 3 years ago
- A 'trainer' agent which is great for showing customers a nice fake 'ransom' screen. Requires target machine to have head - since support …☆11Updated last year