humanaoffsec / raccoon-infostealer-emulation
Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environments
☆17Updated last year
Alternatives and similar repositories for raccoon-infostealer-emulation:
Users that are interested in raccoon-infostealer-emulation are comparing it to the libraries listed below
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆54Updated 5 months ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆15Updated 3 months ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- Mythic C2 wrapper for NimSyscallPacker☆24Updated last month
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- ☆17Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆30Updated last month
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- ☆30Updated 2 years ago
- ☆10Updated last year
- ☆12Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆40Updated 8 months ago
- Bloodhound agent for Mythic☆17Updated 7 months ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Simple reverse ICMP shell☆13Updated 11 months ago
- ☆17Updated 2 years ago
- Discord C2 Profile for Mythic☆28Updated last month
- Top hashpwn rules☆18Updated 4 months ago
- Extract registry and NTDS secrets from local or remote disk images☆39Updated last month
- ☆23Updated 11 months ago
- Linux CS bypass technique☆30Updated 2 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆37Updated 3 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆55Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆30Updated 2 weeks ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 9 months ago
- SACL Scanner is a tool designed to scan and analyze SACLs.☆38Updated 2 months ago
- ☆14Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago