threatexpress / mythic2modrewriteView external linksLinks
Generate Apache mod_rewrite rules for Mythic C2 profiles
☆36Jul 22, 2021Updated 4 years ago
Alternatives and similar repositories for mythic2modrewrite
Users that are interested in mythic2modrewrite are comparing it to the libraries listed below
Sorting:
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Dump Teams conversations☆19Jun 9, 2021Updated 4 years ago
- JXA script to allow programmatic persistence via macOS Calendar.app alerts.☆44Oct 31, 2020Updated 5 years ago
- Event Data Collector☆40Jan 12, 2026Updated last month
- A small POC of using Azure Functions to relay communications. Feel free to add additional functionality beyond this POC!☆80Mar 30, 2023Updated 2 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- ☆65Jan 2, 2024Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- A C# Tool to find left over pentest data for use in your pentest or redteam op. Blue could maybe use to find files to cleanup☆38Sep 14, 2023Updated 2 years ago
- Python3 script to generate a macro to launch a Mythic payload. Author: Cedric Owens☆48Apr 15, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- D/Invoke implementation in Nim☆103Jun 8, 2022Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- Find .net assemblies locally☆131Oct 14, 2022Updated 3 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- ☆39May 21, 2022Updated 3 years ago
- ☆216Nov 6, 2025Updated 3 months ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Feb 6, 2026Updated last week
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆17Jul 18, 2022Updated 3 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Collection of CobaltStrike beacon object files☆105Feb 14, 2022Updated 4 years ago
- Script to use SysWhispers2 direct system calls from Cobalt Strike BOFs☆127May 24, 2022Updated 3 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- ☆67Dec 24, 2021Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated 11 months ago
- Quick and dirty dynamic redirect.rules generator☆169Oct 12, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆22Dec 30, 2025Updated last month
- Section Mapping Process Injection (secinject): Cobalt Strike BOF☆102Jan 7, 2022Updated 4 years ago
- Companion PoC for the "Adventures in Dynamic Evasion" blog post☆130May 25, 2021Updated 4 years ago
- NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs☆96Aug 1, 2022Updated 3 years ago
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- Cobalt Strike beacon object file implementation for trusted path UAC bypass. The target executable will be called without involving "cmd.…☆146Aug 16, 2021Updated 4 years ago
- COFF and BOF Loader written in Nim☆176Aug 1, 2022Updated 3 years ago