Skip to main content
SpecterOps Open Source home page
Mythic Agent: Apollo
Search...
⌘K
Toolkit Hub
Contact Us
Contact Us
Search...
Navigation
whoami
Overview
Commands
C2 Profiles
OPSEC
Contributing
Apollo
assembly_inject
blockdlls
cat
cd
cp
dcsync
download
execute_assembly
execute_coff
execute_pe
exit
get_injection_techniques
getprivs
ifconfig
inject
inline_assembly
jobkill
jobs
keylog_inject
kill
link
listpipes
ls
make_token
mimikatz
mkdir
mv
net_dclist
net_localgroup
net_localgroup_member
net_shares
netstat
powerpick
powershell
powershell_import
ppid
printspoofer
ps
psinject
pth
pwd
reg_query
reg_write_value
register_assembly
register_coff
register_file
rev2Self
rm
run
sc
screenshot
screenshot_inject
set_injection_technique
shell
shinject
sleep
socks
title = "spawn"
spawnto_x64
spawnto_x86
steal_token
ticket_cache_add
ticket_cache_extract
ticket_cache_list
ticket_cache_purge
ticket_store_add
ticket_store_list
ticket_store_purge
unlink
upload
whoami
wmi_execute
On this page
Summary
Usage
MITRE ATT&CK Mapping
whoami
Converted from Markdown to MDX
Summary
Retrieve information about the current process and thread’s access tokens.
Usage
Copy
Ask AI
whoami
MITRE ATT&CK Mapping
T1033
upload
wmi_execute
⌘I