Webshell agent in aspx and php
☆27Dec 11, 2025Updated 3 months ago
Alternatives and similar repositories for arachne
Users that are interested in arachne are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 30, 2025Updated 2 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 3 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Sep 10, 2021Updated 4 years ago
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- Implementation of Indirect Syscall technique to pop a calc.exe☆112Jan 25, 2024Updated 2 years ago
- ☆22Jun 9, 2025Updated 9 months ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 3 weeks ago
- Zoom Persistence Aggressor and Handler☆55Mar 24, 2021Updated 5 years ago
- ObjectiveC CLI tool for interacting with macOS Keychain☆82Oct 10, 2022Updated 3 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 11 months ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A persistent database + CLI for your BBOT scan data 🧡☆42Mar 19, 2026Updated last week
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- ☆26Mar 11, 2025Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 7 months ago
- ☆23Jun 9, 2024Updated last year
- Template repo for hooking 3rd party agents into Mythic while hosting them on external GitHub Repos☆53Nov 18, 2024Updated last year
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- Your Skyfall Infrastructure Pack☆91Jan 25, 2026Updated 2 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- bring your own clean ntdll (or other MS dlls)☆29Jul 14, 2025Updated 8 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆51Dec 7, 2025Updated 3 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Objective-C runtime library wrapper for Nim☆19Jun 7, 2017Updated 8 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 7 months ago
- Discover which process execute a hunted binary inside macOS☆27Dec 15, 2021Updated 4 years ago