Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
☆132May 1, 2026Updated last week
Alternatives and similar repositories for Erebus
Users that are interested in Erebus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆72Mar 8, 2026Updated 2 months ago
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated last month
- ☆143Sep 9, 2025Updated 7 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- ☆40Oct 9, 2025Updated 7 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 9 months ago
- Zero-dependency MCP server implementation.☆75Mar 27, 2026Updated last month
- Atomic test units for BOF execution☆55Apr 26, 2026Updated last week
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 6 months ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆577Dec 17, 2025Updated 4 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆41Aug 5, 2025Updated 9 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆79Mar 7, 2026Updated 2 months ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago
- ☆14Dec 24, 2025Updated 4 months ago
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- A Payload Analysis Framework☆118Oct 9, 2025Updated 6 months ago
- A practical client for ADWS in Golang.☆51Mar 3, 2026Updated 2 months ago
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 11 months ago
- ☆109Oct 29, 2024Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆69Jan 12, 2026Updated 3 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆146Jul 2, 2025Updated 10 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆46Jun 23, 2025Updated 10 months ago
- ☆139Nov 17, 2025Updated 5 months ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- ☆140Jan 16, 2025Updated last year
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 10 months ago
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆134Oct 4, 2024Updated last year
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆261Dec 18, 2025Updated 4 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BOF template with boflink and mutator kit support☆50Jan 8, 2026Updated 4 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 4 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆431Apr 18, 2026Updated 2 weeks ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- a small script to collect information from a management point☆37Jan 19, 2026Updated 3 months ago