SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows security professionals to keep track of their targets and how they are connected. SpiderCat conducts advanced reconnaissance on targets, gathering intel such as the users email, systems information, geolocation & more
☆109Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for MK16-SpiderCat
Users that are interested in MK16-SpiderCat are comparing it to the libraries listed below
Sorting:
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆46Sep 26, 2023Updated 2 years ago
- XOR-based shellcode encoder☆30Apr 20, 2023Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆22Jan 1, 2023Updated 3 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Teamsniper is a tool for fetching keywords in a Microsoft Teams such as (passwords, emails, database, etc.).☆197Sep 19, 2022Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆93Dec 2, 2025Updated 3 months ago
- Your template-based BloodHound terminal companion tool☆446Jan 21, 2026Updated last month
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆170May 24, 2025Updated 9 months ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆386Jul 30, 2024Updated last year
- Detect whether a service is installed (blindly) and/or running (if exposing named pipes) on a remote machine without using local admin pr…☆236Sep 3, 2023Updated 2 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 5 months ago
- Grab NetNTLMv2 hashes using ETW with administrative rights on Windows 8.1 / Windows Server 2016 and later☆96May 9, 2023Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆123Nov 9, 2022Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Nov 5, 2024Updated last year
- ☆176Apr 9, 2025Updated 11 months ago
- ☆106May 15, 2023Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- BYOVD Technique Example using viragt64 driver☆73Jul 25, 2024Updated last year
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Feb 14, 2026Updated 3 weeks ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- ☆107Jan 4, 2023Updated 3 years ago
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- PowerShell Funcitons that can be used to help automate and troubleshoot Windows Updates☆17Feb 19, 2026Updated 2 weeks ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- Retr0's Hacking Scripts☆10Apr 19, 2023Updated 2 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- https://github.com/tatsu-lab/stanford_alpaca☆14Mar 19, 2023Updated 2 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆25Jul 9, 2025Updated 8 months ago