Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a cross-platform client (Python/QT6).
☆312Jul 11, 2025Updated 9 months ago
Alternatives and similar repositories for Arcane
Users that are interested in Arcane are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Arcane - A secure remote desktop application for Windows with the particularity of having a server entirely written in PowerShell and a c…☆36Oct 4, 2024Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Hunting and injecting RWX 'mockingjay' DLLs in pure nim☆60Dec 11, 2024Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆348Nov 19, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Retrieve and display information about active user sessions on remote computers. No admin privileges required.☆207Aug 12, 2024Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆442Jul 8, 2024Updated last year
- Simple pure PowerShell POC to bypass Entra / Intune Compliance Conditional Access Policy☆169Nov 17, 2025Updated 4 months ago
- PowerShell scripts for alternative SharpHound enumeration, including users, groups, computers, and certificates, using the ActiveDirector…☆401Jan 14, 2026Updated 3 months ago
- malware written for educational purposes☆70Dec 31, 2025Updated 3 months ago
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆80Jun 6, 2024Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆286Sep 26, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆256Jul 31, 2024Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆327Jun 27, 2024Updated last year
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 8 months ago
- Inject RDPThief into memory with PowerShell.☆65Jan 21, 2025Updated last year
- .NET Post-Exploitation Utility for Abusing Strong Explicit Certificate Mappings in ADCS☆150Feb 10, 2025Updated last year
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,027Feb 1, 2026Updated 2 months ago
- Simple C# Redirector☆94Aug 31, 2025Updated 7 months ago
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Encrypted shellcode Injection to avoid Kernel triggered memory scans☆409Sep 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆378Mar 31, 2026Updated 2 weeks ago
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Writing Nimless Nim - Slides and source for BSIDESKC 2024 talk.☆85Jul 11, 2025Updated 9 months ago
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆209Dec 25, 2024Updated last year
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆619Feb 21, 2024Updated 2 years ago
- Some Rust program I wrote while learning Malware Development☆161Feb 4, 2025Updated last year
- .NET assembly loader with patchless AMSI and ETW bypass☆375Apr 19, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The GPOddity project, aiming at automating GPO attack vectors through NTLM relaying (and more).☆364Dec 13, 2025Updated 4 months ago
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆209Jun 10, 2024Updated last year
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Nim Library for Offensive Security Development☆199Sep 4, 2023Updated 2 years ago
- Add Shadow Credentials to a target object by editing their msDS-KeyCredentialLink attribute☆25Jun 5, 2024Updated last year