☆22Jun 9, 2025Updated 8 months ago
Alternatives and similar repositories for scarecrow_wrapper
Users that are interested in scarecrow_wrapper are comparing it to the libraries listed below
Sorting:
- Mythic Developer Series: Workshop Golang Agent☆25Jun 27, 2023Updated 2 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- ☆22Dec 30, 2025Updated 2 months ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- Payload designed for targeting Jamf enrolled devices.☆39May 19, 2023Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆63Oct 29, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆202Aug 1, 2025Updated 7 months ago
- Uses Apple's MDM protocol to backdoor a device with a malicious profile.☆57Oct 12, 2021Updated 4 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆113Apr 16, 2025Updated 10 months ago
- ☆22Jan 2, 2026Updated 2 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Feb 26, 2024Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Poseidon is a Golang agent targeting Linux and macOS☆204Feb 20, 2026Updated last week
- A Visual Studio Code Extension agent for Mythic C2☆71Nov 5, 2024Updated last year
- ☆27Aug 8, 2021Updated 4 years ago
- Webshell agent in aspx and php☆28Dec 11, 2025Updated 2 months ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆14Jun 27, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- A persistent database + CLI for your BBOT scan data 🧡☆42Updated this week
- ☆29Sep 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- ☆26Mar 11, 2025Updated 11 months ago
- ☆14Mar 19, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Decrypt mRemoteNG passwords☆66May 10, 2022Updated 3 years ago
- JavaScript for Automation (JXA) macOS agent☆92Feb 19, 2026Updated last week
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated last year
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated 2 weeks ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago