Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
☆127Apr 13, 2026Updated this week
Alternatives and similar repositories for Erebus
Users that are interested in Erebus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated last month
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆25Mar 19, 2026Updated 3 weeks ago
- ☆142Sep 9, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- early cascade injection PoC based on Outflanks blog post☆241Nov 7, 2024Updated last year
- ☆39Oct 9, 2025Updated 6 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 9 months ago
- Zero-dependency MCP server implementation.☆74Mar 27, 2026Updated 2 weeks ago
- Locate dlls and function addresses without PEB Walk and EAT parsing☆104Nov 7, 2025Updated 5 months ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆73Mar 7, 2026Updated last month
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆573Dec 17, 2025Updated 3 months ago
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- ☆13Dec 24, 2025Updated 3 months ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- A Payload Analysis Framework☆118Oct 9, 2025Updated 6 months ago
- A practical client for ADWS in Golang.☆50Mar 3, 2026Updated last month
- Umbrella will protect your shellcode from the rain.☆30Jun 4, 2025Updated 10 months ago
- ☆108Oct 29, 2024Updated last year
- A lightweight Windows Prefetch file parser to extract programs' execution history☆68Jan 12, 2026Updated 3 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆143Jul 2, 2025Updated 9 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- ☆138Nov 17, 2025Updated 4 months ago
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 3 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆94Jul 7, 2025Updated 9 months ago
- ☆138Jan 16, 2025Updated last year
- List web account manager (WAM) accounts added to the current profile☆26Dec 11, 2025Updated 4 months ago
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆133Oct 4, 2024Updated last year
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆257Dec 18, 2025Updated 3 months ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆111Jan 26, 2026Updated 2 months ago
- FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loadi…☆409Sep 26, 2024Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆74Dec 26, 2025Updated 3 months ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆102Apr 9, 2026Updated last week
- One WSL BOF to rule them all☆174Jan 14, 2026Updated 3 months ago