Termitty / termittyLinks
The terminal automation framework
☆40Updated 3 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 3 months ago
- A fork of the Go language with some tweaks☆51Updated 7 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆103Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 4 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆25Updated 3 weeks ago
- ☆41Updated last month
- ☆164Updated 3 weeks ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆34Updated this week
- Protection against HTML smuggling attacks.☆97Updated last month
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆56Updated last month
- BlueSky OSINT Tool☆14Updated 8 months ago
- Minimal workflows☆20Updated last year
- Hijack a slack bot to phish your way in☆56Updated last month
- Malware traffic obfuscation library☆37Updated last month
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆40Updated last year
- Asynchronous NFSv3 client in pure Python☆26Updated last month
- AI-based implant feature☆25Updated 4 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆65Updated this week
- A slightly more fun way to disable windows defender☆44Updated 3 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆130Updated this week
- Simple reverse ICMP shell☆14Updated last year
- An OpenAI API Compatible Honeypot Gateway☆16Updated 5 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆99Updated 2 months ago
- Putting a leash on naughty AWS permissions☆128Updated 4 months ago
- ☆17Updated 7 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated last month
- HTML Smuggling with Web Assembly☆63Updated last year
- Monarch - The Adversary Emulation Toolkit☆63Updated 7 months ago