P2P Communications of Named Pipes
☆12Dec 11, 2025Updated 2 months ago
Alternatives and similar repositories for smb
Users that are interested in smb are comparing it to the libraries listed below
Sorting:
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Dec 15, 2025Updated 2 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- MCP wrapper for Hashcat – automate hash cracking with natural language☆24Jun 5, 2025Updated 8 months ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆15Jun 2, 2025Updated 9 months ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆52Nov 18, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated this week
- Simple HTTP async comms using standard GET/POST requests☆47Feb 5, 2026Updated 3 weeks ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 5 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 6 months ago
- A script that can be deployed to Azure App for C2 / Proxy / Redirector☆41May 17, 2019Updated 6 years ago
- List of Awesome Excel4.0/XLM tricks and functions useful for Red Team and Blue Team. This list is for anyone wishing to learn about Excel…☆37Apr 27, 2021Updated 4 years ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- Complete Malware Index - Use at your own Risk!☆20Sep 2, 2024Updated last year
- ☆48May 12, 2021Updated 4 years ago
- ☆22Jan 2, 2026Updated last month
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Dec 16, 2025Updated 2 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- GitleaksVerifier is a Python-based verification tool designed to enhance the functionality of Gitleaks by rigorously validating secrets f…☆29Mar 9, 2025Updated 11 months ago
- Machine learning enabled dropper☆28May 1, 2023Updated 2 years ago
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- ☆10Updated this week
- ☆38Feb 26, 2025Updated last year
- ☆215Feb 20, 2026Updated last week
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆30Nov 9, 2021Updated 4 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆35Dec 1, 2025Updated 3 months ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Feb 22, 2026Updated last week
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- Bug Bounty Web and API Payloads☆39Feb 5, 2026Updated 3 weeks ago
- ☆13Jun 29, 2023Updated 2 years ago