MythicMeta / MythicContainerLinks
GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers
☆19Updated 4 months ago
Alternatives and similar repositories for MythicContainer
Users that are interested in MythicContainer are comparing it to the libraries listed below
Sorting:
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.☆44Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- ☆18Updated last month
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆19Updated 2 years ago
- ☆3Updated 7 months ago
- A PoC for achieving persistence via push notifications on Windows☆47Updated 2 years ago
- A repo to house files for our blogposts on blog.nviso.eu☆72Updated 4 months ago
- ☆23Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆52Updated last year
- A library to parse, modify, and implement Malleable C2 profiles☆26Updated 6 years ago
- A collection of sample code used in some experiments with Sliver C2☆14Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Updated last year
- Collection of Rust repos useful for Red Teamers.☆34Updated 2 years ago
- AV/EDR companies netblocks☆17Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- A post-exploitation strategy for persistence and egress from networks utilizing authenticated web proxies☆33Updated 2 years ago
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- ☆31Updated 2 years ago
- c# reverse shell poc☆27Updated 6 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- IOXIDResolver from AirBus Security/PingCastle☆51Updated 4 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆16Updated last week