C2 Application based GUI with the agent generator.
☆13May 12, 2025Updated 11 months ago
Alternatives and similar repositories for Grizzly
Users that are interested in Grizzly are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.☆11Jul 9, 2024Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Jun 25, 2024Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.☆13May 21, 2024Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.☆21Jul 8, 2024Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.☆19Jul 9, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Jan 4, 2025Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆14Jun 24, 2024Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Oct 27, 2024Updated last year
- LLMNR/NBT-NS Poisoning and capturer