Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos
☆53Nov 18, 2024Updated last year
Alternatives and similar repositories for Mythic_External_Agent
Users that are interested in Mythic_External_Agent are comparing it to the libraries listed below
Sorting:
- ☆15May 26, 2021Updated 4 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- ☆22Jan 2, 2026Updated 2 months ago
- ☆13Dec 27, 2023Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- A cross-platform implant written in Nim☆175Mar 6, 2024Updated 2 years ago
- Initial Commit of Coresploit☆57Oct 12, 2021Updated 4 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆201Aug 1, 2025Updated 7 months ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- ☆27Aug 8, 2021Updated 4 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- JXA situational awareness helper by simply reading specific files on a filesystem☆82Feb 17, 2026Updated last month
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- Automated compiler obfuscation for nim☆139Jun 27, 2022Updated 3 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Swift code to programmatically perform dylib injection☆52Oct 29, 2022Updated 3 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Webshell agent in aspx and php☆27Dec 11, 2025Updated 3 months ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆193Nov 18, 2024Updated last year
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Pseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windo…☆233Mar 18, 2024Updated 2 years ago
- D/Invoke port of UrbanBishop☆108Jul 19, 2020Updated 5 years ago
- Implementation of b4rtiks's SharpMiniDump using NTFS transactions to avoid writting the minidump to disk and exfiltrating it via HTTPS us…☆71Nov 14, 2020Updated 5 years ago
- A simple BOF implementation of klist using Windows API☆32Jul 7, 2022Updated 3 years ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- Mythic Scripting PyPi package - mythic☆29Oct 10, 2025Updated 5 months ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- C# Wrapper around Chisel from https://github.com/jpillora/chisel☆160Feb 25, 2023Updated 3 years ago