antman1p / freyjaLinks
Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.
☆42Updated 9 months ago
Alternatives and similar repositories for freyja
Users that are interested in freyja are comparing it to the libraries listed below
Sorting:
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆59Updated 9 months ago
- ☆15Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆19Updated 5 months ago
- ☆58Updated 2 years ago
- Payload designed for targeting Jamf enrolled devices.☆38Updated 2 years ago
- Ansible role that Installs Mythic☆18Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Updated 3 years ago
- ☆39Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆21Updated 3 months ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- ☆18Updated last year
- ☆21Updated last year
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆47Updated 4 years ago
- WMI SA stuffs☆30Updated 3 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Updated 2 years ago
- Artifact monitoring that ensures fairplay☆75Updated 6 months ago
- blame Huy☆42Updated 4 years ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- Reproducible and extensible BloodHound playbooks☆44Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆51Updated 4 years ago
- Continuous kerberoast monitor☆45Updated last year
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago
- Tool to perform lateral movement between AAD joined devices☆64Updated 3 years ago
- ☆10Updated 11 months ago
- ☆23Updated 3 years ago
- Talk slides and material☆33Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago