☆57Aug 19, 2024Updated last year
Alternatives and similar repositories for ScallOps
Users that are interested in ScallOps are comparing it to the libraries listed below
Sorting:
- ☆24Jun 13, 2022Updated 3 years ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 5 years ago
- Mythic Scripting PyPi package - mythic☆28Oct 10, 2025Updated 4 months ago
- Hiding your infrastructure from the boys in blue.☆23Oct 18, 2021Updated 4 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- ☆20Feb 23, 2019Updated 7 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Tools for attacking Computer Use Agents☆21Jan 16, 2026Updated last month
- easy-to-use payload hosting☆275Apr 22, 2022Updated 3 years ago
- ☆121Jan 7, 2026Updated last month
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- ☆27Aug 8, 2021Updated 4 years ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- Unauthenticated start EFS service on remote Windows host (make PetitPotam great again)☆129Oct 23, 2025Updated 4 months ago
- Powershell and python utilties for Entra Connect☆28Jun 5, 2025Updated 8 months ago
- ☆154Mar 26, 2025Updated 11 months ago
- A port of FuzzySecurity's UrbanBishop project for inline shellcode execution☆118Sep 29, 2020Updated 5 years ago
- Quick and dirty dynamic redirect.rules generator☆170Oct 12, 2022Updated 3 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- AI-based Ludus range configuration builder☆29May 6, 2025Updated 9 months ago
- A basic meterpreter protocol stager using the libpeconv library by hasherezade for reflective loading☆84Nov 21, 2022Updated 3 years ago
- Tracking of offensive macOS tooling, blogs, and related helpful information☆192Nov 18, 2024Updated last year
- ☆88Jun 17, 2023Updated 2 years ago
- Azure JWT Token Manipulation Toolset☆716Dec 6, 2024Updated last year
- a collection of profiles for macOS designed for penetration testing or red teaming☆38Apr 15, 2019Updated 6 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- Red Team Templates For Obsidian.md☆32Jan 7, 2022Updated 4 years ago
- C# implementation of the token privilege removal flaw discovered by @GabrielLandau/Elastic☆144Feb 23, 2022Updated 4 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- Convenience tool for hashcat☆121Aug 26, 2025Updated 6 months ago
- Enumerate Domain Data☆336Sep 13, 2023Updated 2 years ago
- ☆35Feb 5, 2026Updated last month
- macOS codesigning translocation vulnerability.☆42Sep 26, 2021Updated 4 years ago