Loading...

Looking for alternatives to Mystikal? A macOS Initial Access Payload Generator for penetration testing and red teaming exercises. Browse 17 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
CrossC2 is a cross-platform payload generator that extends CobaltStrike's capabilities to Linux and macOS environments for red team operations.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.
Covenant is a collaborative .NET command and control framework designed for red team operations and offensive security engagements.
EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.
Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.
Ivy is a payload creation framework for executing arbitrary VBA source code directly in memory, utilizing programmatical access to load, decrypt, and execute shellcode.
Macro_Pack automates the generation and obfuscation of Office documents and scripts for penetration testing and security assessments.
A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.
A payload creation framework designed to bypass Endpoint Detection and Response (EDR) systems.
SourcePoint generates customizable C2 profiles for Cobalt Strike servers to enhance evasion capabilities against security defenses.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
A proof-of-concept tool that generates Excel BIFF8 files with embedded 4.0 macros programmatically without requiring Microsoft Excel installation.
A collection of tools that execute programs directly in memory using various delivery methods including URL downloads and netcat connections.
InvalidSign is a security research tool that bypasses endpoint solutions by obtaining valid signed files with different hashes to evade signature-based detection mechanisms.
A comprehensive repository of red teaming resources including cheatsheets, detailed notes, automation scripts, and practice platforms covering multiple cybersecurity domains.
Get strategic cybersecurity insights in your inbox