Mythic C2 wrapper for NimSyscallPacker
☆25Mar 12, 2025Updated last year
Alternatives and similar repositories for Mythic_NimSyscallPacker_Wrapper
Users that are interested in Mythic_NimSyscallPacker_Wrapper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- ☆14Sep 26, 2023Updated 2 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Indirect syscalls + DInvoke made simple.☆95Dec 24, 2024Updated last year
- ☆53Sep 23, 2025Updated 6 months ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- string encryption in Nim☆19Jun 15, 2024Updated last year
- This is a simulation of attack by (Voodoo Bear) APT group targeting entities in Eastern Europe the attack campaign was active as early as…☆12Jun 19, 2024Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 4 months ago
- An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD d…☆50Feb 23, 2026Updated last month
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- A C# port of https://gist.github.com/adamsvoboda/8f29e09d74b73e1dec3f9049c4358e80☆21Apr 2, 2025Updated 11 months ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- ☆59Nov 13, 2024Updated last year
- ☆65Dec 19, 2024Updated last year
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- ☆29Aug 24, 2025Updated 7 months ago
- A Rust port of LayeredSyscall — performs indirect syscalls while generating legitimate API call stack frames by abusing VEH.☆164Oct 31, 2024Updated last year
- early cascade injection PoC based on Outflanks blog post☆239Nov 7, 2024Updated last year
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 11 months ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- Local SYSTEM auth trigger for relaying - X☆154Jul 23, 2025Updated 8 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Logging tool intended for red team usage☆36Dec 5, 2025Updated 3 months ago
- ☆14Jul 26, 2025Updated 7 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 8 months ago
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆168Nov 17, 2025Updated 4 months ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year