SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows security professionals to keep track of their targets and how they are connected. SpiderCat conducts advanced reconnaissance on targets, gathering intel such as the users email, systems information, geolocation & more
☆110Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for MK16-SpiderCat
Users that are interested in MK16-SpiderCat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Sep 26, 2023Updated 2 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆171May 24, 2025Updated 10 months ago
- Retr0's Hacking Scripts☆10Apr 19, 2023Updated 2 years ago
- Discord bot using the cryptography toolkit of SkeletonKey☆12Nov 18, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆59Feb 7, 2024Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Your template-based BloodHound terminal companion tool☆447Jan 21, 2026Updated 2 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆95Dec 2, 2025Updated 3 months ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆387Jul 30, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- View in depth data of all Bluetooth devices around your Ubertooth device. Sends the data remotely to a Discord Webhook if desired so you …☆23Aug 3, 2024Updated last year
- Custom firmware for the HackRF+PortaPack H1/H2☆19Dec 14, 2025Updated 3 months ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆106May 15, 2023Updated 2 years ago
- ☆177Apr 9, 2025Updated 11 months ago
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆17Aug 20, 2025Updated 7 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Nov 9, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My implementation of the GIUDA project in C++☆189Jul 25, 2023Updated 2 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Automated exploitation of MSSQL servers at scale☆128Feb 21, 2026Updated last month
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆237Sep 3, 2023Updated 2 years ago
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated 2 years ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆119May 9, 2023Updated 2 years ago