Webshell agent in aspx and php
☆27Dec 11, 2025Updated 4 months ago
Alternatives and similar repositories for arachne
Users that are interested in arachne are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 30, 2025Updated 4 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 4 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 5 years ago
- Payload designed for targeting Jamf enrolled devices.☆40May 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆18Sep 10, 2021Updated 4 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- ☆22Jun 9, 2025Updated 10 months ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 2 months ago
- Zoom Persistence Aggressor and Handler☆56Mar 24, 2021Updated 5 years ago
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- ObjectiveC CLI tool for interacting with macOS Keychain☆84Oct 10, 2022Updated 3 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated last year
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Deobfuscation of XorStringsNet☆13Nov 5, 2024Updated last year
- A persistent database + CLI for your BBOT scan data 🧡☆44Apr 30, 2026Updated last week
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- ☆26Mar 11, 2025Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆205Apr 2, 2026Updated last month
- ☆23Jun 9, 2024Updated last year
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆54Nov 18, 2024Updated last year
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- Your Skyfall Infrastructure Pack☆99Apr 10, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 9 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆32Feb 13, 2026Updated 2 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 5 months ago
- Objective-C runtime library wrapper for Nim☆19Jun 7, 2017Updated 8 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- Discover which process execute a hunted binary inside macOS☆29Dec 15, 2021Updated 4 years ago
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 4 months ago