Erebus is an Initial Access wrapper for the Mythic Command & Control Server. It converts existing Mythic shellcode into payloads specifically used for phishing and IA operations.
☆116Mar 21, 2026Updated this week
Alternatives and similar repositories for Erebus
Users that are interested in Erebus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Community Eventing and Scripting examples☆19Aug 11, 2025Updated 7 months ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Mar 19, 2026Updated last week
- ☆142Sep 9, 2025Updated 6 months ago
- Zero-dependency MCP server implementation.☆74Feb 23, 2026Updated last month
- early cascade injection PoC based on Outflanks blog post☆240Nov 7, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆67Mar 7, 2026Updated 2 weeks ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 2 months ago
- ☆14Dec 24, 2025Updated 3 months ago
- A Payload Analysis Framework☆116Oct 9, 2025Updated 5 months ago
- A tool for coercing and relaying Kerberos authentication over DCOM and RPC.☆148Jul 17, 2025Updated 8 months ago
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆97Updated this week
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated 2 weeks ago
- Umbrella will protect your shellcode from the rain.☆31Jun 4, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆140Jul 2, 2025Updated 8 months ago
- Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when a…☆95Jul 7, 2025Updated 8 months ago
- ☆139Jan 16, 2025Updated last year
- A tool to transform Chromium browsers into a C2 Implant☆557Dec 17, 2025Updated 3 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 6 months ago
- Execute shellcode via Bluetooth device authentication☆41Feb 19, 2025Updated last year
- Locate dlls and function addresses without PEB Walk and EAT parsing☆105Nov 7, 2025Updated 4 months ago
- A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN☆108Jan 26, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Mar 17, 2026Updated last week
- Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM☆64Dec 25, 2025Updated 3 months ago
- ☆26Dec 21, 2025Updated 3 months ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆52Jul 18, 2025Updated 8 months ago
- A small How-To on creating your own weaponized WSL file☆124Jul 23, 2025Updated 8 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆197Feb 16, 2026Updated last month
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts.☆166Jan 23, 2026Updated 2 months ago
- Living of the Land of Free SaaS☆63Updated this week
- ☆37Dec 4, 2025Updated 3 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- ☆109Oct 29, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago