t94j0 / ansible-role-mythic
Ansible role that Installs Mythic
☆15Updated 9 months ago
Alternatives and similar repositories for ansible-role-mythic:
Users that are interested in ansible-role-mythic are comparing it to the libraries listed below
- ☆25Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆30Updated 3 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- Payload Generation Framework☆9Updated 5 years ago
- ☆2Updated 4 months ago
- ☆18Updated last year
- ☆14Updated last year
- Scripts to interact with Microsoft Graph APIs☆36Updated 5 months ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆25Updated 2 years ago
- ☆14Updated 3 years ago
- A Couple of Python Scripts Leveraging MS365's GraphAPI to Send Custom Calendar Events / Emails from Cheap O365 Accounts☆18Updated last year
- Password spray wrapper for OpenConnect VPN client☆11Updated 4 years ago
- Ansible role to deploy RedELK server☆18Updated last year
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17Updated 3 years ago
- Nemesis agent for Mythic☆27Updated 7 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- .NET wrapper around LogonUserA to test creds☆12Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆24Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Updated 3 years ago
- Find Inbound Email Domains☆22Updated last year
- Reproducible and extensible BloodHound playbooks☆43Updated 5 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆11Updated 2 years ago
- ☆21Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Updated 2 years ago