dreadnode / marqueLinks
Minimal workflows
☆20Updated last year
Alternatives and similar repositories for marque
Users that are interested in marque are comparing it to the libraries listed below
Sorting:
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆68Updated 2 months ago
- ☆17Updated last year
- HTML Smuggling with Web Assembly☆64Updated last year
- Nemesis agent for Mythic☆27Updated last year
- A standalone tool for logging shell commands to GhostWriter automatically☆18Updated last year
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 7 months ago
- Simple reverse ICMP shell☆14Updated last year
- Bloodhound agent for Mythic☆21Updated 6 months ago
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆88Updated 9 months ago
- A simple POC to expose Mythic as a MCP server☆72Updated 7 months ago
- SMB Audit Tool you were looking for☆22Updated 2 years ago
- Linux CS bypass technique☆32Updated 8 months ago
- POC tool to abuse windows server failover clusters☆46Updated 2 months ago
- macOS dylib stager☆36Updated 9 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 3 years ago
- A helper script for consolidating Aggressor and BOF repositories into a single CNA for Cobalt Strike.☆18Updated last year
- Extract the Procedures (TTP) from CTI reports☆12Updated 4 months ago
- ☆40Updated last year
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated 3 weeks ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆58Updated 3 years ago
- ☆51Updated last year
- Your Skyfall Infrastructure Pack☆83Updated last week
- Microsoft365 Device Code Phishing Framework☆38Updated 4 years ago
- Find Inbound Email Domains☆35Updated last year
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆50Updated 11 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆42Updated last week
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆50Updated last year
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Updated 3 months ago