Termitty / termittyLinks
The terminal automation framework
☆40Updated last month
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆121Updated 2 months ago
- A fork of the Go language with some tweaks☆50Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Protection against HTML smuggling attacks.☆96Updated last week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆36Updated 2 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆30Updated this week
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆74Updated this week
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆11Updated 3 months ago
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- ☆29Updated 2 weeks ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆39Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 4 months ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆19Updated 4 months ago
- A slightly more fun way to disable windows defender☆43Updated 2 months ago
- Simple reverse ICMP shell☆14Updated last year
- Minimal workflows☆19Updated last year
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Asynchronous NFSv3 client in pure Python☆26Updated 4 months ago
- An OpenAI API Compatible Honeypot Gateway☆16Updated 4 months ago
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆59Updated last month
- ☆17Updated 6 months ago
- HTML Smuggling with Web Assembly☆63Updated last year
- Top hashpwn rules☆19Updated 7 months ago
- AI-based implant feature☆24Updated 2 months ago
- C2 writen in Rust & Go powered by Tor network.☆106Updated last week
- Nemesis agent for Mythic☆27Updated 10 months ago
- BlueSky OSINT Tool☆14Updated 7 months ago
- Linux CS bypass technique☆33Updated 5 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆49Updated 4 months ago