Skip to main content
SpecterOps Banner
Slack

Welcome

Welcome to the SpecterOps open source toolkit documentation. This collection represents years of offensive security research and tool development, covering command and control frameworks, Active Directory security, reconnaissance platforms, and specialized attack tools.
All tools are provided for legitimate security research, penetration testing, and red team operations. Always obtain proper authorization before use.

🎯 Command & Control Frameworks

Enterprise-grade C2 platforms for red team operations and adversary emulation.

🤖 Mythic Agents

Comprehensive collection of Mythic agents for post-exploitation, system integration, and command augmentation. View all Mythic agents →

Payload Agents

Service & Integration Agents


👻 GhostPack Suite

Collection of C# offensive security tools for Windows and Active Directory environments by @harmj0y and team.

🖥️ SCCM Security

Specialized tools for attacking and defending Microsoft Configuration Manager (SCCM) environments.

🔍 Reconnaissance & OSINT

Tools for intelligence gathering, social engineering preparation, and offensive reconnaissance operations.

🎣 Phishing Infrastructure

Comprehensive phishing platforms for social engineering assessments and credential harvesting operations.

🛠️ Operations Support

Supporting tools for data enrichment, analysis, and operational efficiency during engagements.

📚 Tool Categories

  • By Target
  • By Language
  • By Phase
Windows SystemsmacOS SystemsLinux SystemsActive DirectorySCCM EnvironmentsCloud & SaaSSocial Engineering

🎓 Resources & Community


⚖️ Responsible Use

All tools in this collection are provided for legitimate security testing purposes only.
These tools should only be used:
  • During authorized penetration testing engagements
  • In controlled lab environments for research
  • For defensive detection development
  • With explicit written permission from system owners
Unauthorized use of these tools may be illegal and unethical. Always:
  • Obtain proper authorization before testing
  • Follow scope and rules of engagement
  • Document all activities for client reporting
  • Respect privacy laws and regulations
  • Use tools responsibly and ethically

Maintained by SpecterOps