MythicMeta / Mythic_ScriptingLinks
Mythic Scripting PyPi package - mythic
☆26Updated last month
Alternatives and similar repositories for Mythic_Scripting
Users that are interested in Mythic_Scripting are comparing it to the libraries listed below
Sorting:
- Microsoft365 Device Code Phishing Framework☆39Updated 4 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆70Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- Smuggle a file to a user's browser☆20Updated 3 years ago
- Generate droppers with encrypted payloads automatically.☆54Updated 4 years ago
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆50Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆19Updated last year
- Nemesis agent for Mythic☆28Updated last year
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Updated 4 years ago
- ☆26Updated 4 years ago
- Find Inbound Email Domains☆35Updated last year
- Living Off the Foreign Land setup scripts☆72Updated 9 months ago
- Scripts to interact with Microsoft Graph APIs☆44Updated last year
- HTML Smuggling with Web Assembly☆64Updated last year
- ☆40Updated last year
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆30Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- A set of hashcat hcmask files, prioritized by cracking efficiency... and the hcmask_Generator_9000.xlsx tool.☆25Updated last year
- Mythic Developer Series: Workshop Golang Agent☆26Updated 2 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Updated 2 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆38Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 8 months ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆39Updated 3 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆44Updated 2 years ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆69Updated 4 months ago
- ☆14Updated 2 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆34Updated last year
- ☆60Updated 4 years ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year