xpn / mythic_mcpLinks
A simple POC to expose Mythic as a MCP server
☆72Updated 9 months ago
Alternatives and similar repositories for mythic_mcp
Users that are interested in mythic_mcp are comparing it to the libraries listed below
Sorting:
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆89Updated 11 months ago
- Your Skyfall Infrastructure Pack☆89Updated last month
- Blog/Journal on how to backdoor VSCode extensions☆75Updated 5 months ago
- ☆52Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆97Updated last year
- ☆41Updated 10 months ago
- Sniffing files generator☆59Updated 10 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆58Updated 5 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Updated 2 years ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆123Updated last month
- Payload Generation Workflow☆40Updated 5 months ago
- ☆57Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆88Updated last month
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆90Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆155Updated 2 months ago
- Red AI Archive: Jeff Sims - A curated collection of work in AI safety, cybersecurity data science, and AI red teaming – my own research a…☆26Updated 8 months ago
- Permanently disable EDRs as local admin☆122Updated last week
- Using Chromium-based browsers as a proxy for C2 traffic.☆130Updated 3 weeks ago
- Utilizng an MCP Server to communicate with your C2☆86Updated 7 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Updated 3 weeks ago
- A Nemesis powered Retrieval-Augmented Generation (RAG) chatbot proof-of-concept.☆70Updated 4 months ago
- Lateral Movement as loggedon User via Speech Named Pipe COM & ISpeechNamedPipe + COM Hijacking☆133Updated 5 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆92Updated last month
- ☆26Updated 9 months ago
- A small How-To on creating your own weaponized WSL file☆118Updated 5 months ago
- SCEP request tool for AD CS and Intune☆74Updated 2 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 7 months ago
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- ☆34Updated 5 months ago