The terminal automation framework
☆42May 28, 2025Updated 9 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆17Jan 9, 2025Updated last year
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- ☆31Jul 26, 2024Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 3 months ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 8 months ago
- Small parsec-like parser combinators library with semi-automatic error recovery☆16Aug 16, 2024Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 10 months ago
- Fast covert timing channel communication for inter-process and inter-processor communication on Windows systems.☆69Nov 15, 2025Updated 4 months ago
- ACL Viewer for Windows☆133May 4, 2025Updated 10 months ago
- ☆18Feb 29, 2024Updated 2 years ago
- ☆61Oct 24, 2025Updated 4 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 11 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Mar 10, 2025Updated last year
- Parser and reconciliation tooling for large Active Directory environments.☆33Feb 18, 2025Updated last year
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆167Nov 2, 2025Updated 4 months ago
- ☆31Dec 5, 2024Updated last year
- ☆43Jul 17, 2025Updated 8 months ago
- a small script to collect information from a management point☆37Jan 19, 2026Updated 2 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated 11 months ago
- Slides and resources from MCTTP 2025 Talk☆67Oct 26, 2025Updated 4 months ago
- Static analysis tool to Identify and Fix GitHub Actions prone to Supply‑Chain Risks☆14Dec 24, 2025Updated 2 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Logging tool intended for red team usage☆36Dec 5, 2025Updated 3 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆73Jul 16, 2025Updated 8 months ago
- Fixed 2025 version of Mega Dumper with 64 bit and generic PE support. It can solve Enigma Latest (7.90)☆28Dec 27, 2025Updated 2 months ago