https://github.com/byt3n33dl3/apolloexec
A .NET Framework 4.0 Windows Agent for Credential Tracking and Manipulation, also Remote code Execution.
https://github.com/byt3n33dl3/apolloexec
apollo code-execution dotnet offensive-security pentesting remote-access
Last synced: 12 months ago
JSON representation
A .NET Framework 4.0 Windows Agent for Credential Tracking and Manipulation, also Remote code Execution.
- Host: GitHub
- URL: https://github.com/byt3n33dl3/apolloexec
- Owner: byt3n33dl3
- License: gpl-3.0
- Created: 2024-04-02T09:15:36.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2024-11-22T16:54:04.000Z (over 1 year ago)
- Last Synced: 2025-04-16T01:57:20.196Z (12 months ago)
- Topics: apollo, code-execution, dotnet, offensive-security, pentesting, remote-access
- Language: C#
- Homepage:
- Size: 7.76 MB
- Stars: 7
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/funding.yml
- License: LICENSE.md
- Code of conduct: CODE_OF_CONDUCT
- Security: SECURITY.md
Awesome Lists containing this project
README

ApolloExec is a Windows agent written in C# using the 4.0 .NET Framework designed to be used in SpecterOps training offerings. A .NET Framework 4.0 Windows Agent for remote code Execution
# Installation
To install ApolloExec, you'll need Mythic installed on a remote computer. You can find installation instructions for Mythic at the [Mythic](https://github.com/byt3n33dl3/Mythic/) project page.
From the Mythic install directory, use the following command to install ApolloExec as the **root** user:
```
./ApolloExec install github https://github.com/byt3n33dl3/ApolloExec.git
```
From the Mythic install directory, use the following command to install ApolloExec as a **non-root** user:
```
sudo -E ./ApolloExec install github https://github.com/byt3n33dl3/ApolloExec.git
```
Once installed, restart Mythic to build a new agent.
# Notable `Features`
- P2P Communication
- Credential Tracking and Manipulation
- Unmanged PE, .NET Assembly, and PowerShell Script Execution
- User Exploitation Suite
- SOCKSv5 Support
# Special `Thanks`
A big thanks goes to those who have contributed to the project in both major and minor ways.
- Sulaiman Aziz, [@byt3n33dl3](https://twitter.com/byt3n33dl3)
- Cody Thomas, [@its_a_feature_](https://twitter.com/its_a_feature_)
- Calvin Hedler, [@001SPARTaN](https://twitter.com/001spartan)
- Lee Christensen, [@tifkin_](https://twitter.com/tifkin_)
- Brandon Forbes, [@reznok](https://twitter.com/rezn0k)
- Thiago Mayllart, [@thiagomayllart](https://twitter.com/thiagomayllart)
- Matt Hand, [@matterpreter](https://twitter.com/matterpreter)
- Hope Walker, [@IceMoonHSV](https://twitter.com/IceMoonHSV)
- Jack Ullrich, [@winternl_t](https://twitter.com/winternl_t)
- Elad Shamir, [@elad_shamir](https://twitter.com/elad_shamir)
- Ben Turner [@benpturner](https://twitter.com/benpturner)
- Ian Wallace [@strawp](https://twitter.com/strawp)
- m0rv4i [@m0rv4i](https://twitter.com/m0rv4i)
- Harley Lebeau [@r3dQu1nn](https://twitter.com/r3dQu1nn)
- Antonio Quina [@st3r30byt3](https://twitter.com/st3r30byt3)
- Sean Pierce [@secure_sean](https://twitter.com/secure_sean)
- Evan McBroom, [@EvanMcBroom](https://gist.github.com/EvanMcBroom)
- Matt Ehrnschwender, [@M_alphaaa](https://x.com/M_alphaaa)