The terminal automation framework
☆41May 28, 2025Updated 9 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- SACL Scanner is a tool designed to scan and analyze SACLs.☆51Feb 13, 2025Updated last year
- ☆31Jul 26, 2024Updated last year
- ☆17Jan 9, 2025Updated last year
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- A tool for leveraging elevated acess over a computer to boot the computer into Windows Safe Mode, alter settings, and then boot back into…☆16Nov 6, 2021Updated 4 years ago
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- In-memory sleep encryption and heap encryption for Go applications through a shellcode function.☆40Jan 14, 2024Updated 2 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Advanced In-Memory PowerShell Process Injection Framework☆72Jul 16, 2025Updated 7 months ago
- A library to make HTTP requests with the Windows winhttp API☆25Feb 8, 2024Updated 2 years ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Jan 17, 2020Updated 6 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Scripts that automate portions of pentests.☆57Feb 13, 2026Updated 2 weeks ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Generate CIA/NSA style project codenames☆21Sep 29, 2017Updated 8 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- ☆61Oct 24, 2025Updated 4 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆107Mar 10, 2025Updated 11 months ago
- Panoptes Endpoint Detection and Response Solution☆42Jan 19, 2026Updated last month
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Dec 2, 2025Updated 2 months ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Asynchronous NFSv3 client in pure Python☆28Jul 16, 2025Updated 7 months ago
- ☆38Apr 15, 2025Updated 10 months ago
- Caesar-Cipher based encryption☆29Mar 1, 2021Updated 4 years ago
- Load a dynamic library from memory using a fuse mount☆31Sep 15, 2023Updated 2 years ago
- ☆43Jul 17, 2025Updated 7 months ago
- A simple Python package with a drop-in replacement for boto3.Session named RefreshableSession. It automatically refreshes temporary AWS c…☆49Feb 16, 2026Updated last week
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- ☆31Dec 5, 2024Updated last year
- ACL Viewer for Windows☆133May 4, 2025Updated 9 months ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆58Dec 15, 2025Updated 2 months ago
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 9 months ago
- A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA …☆163Nov 2, 2025Updated 3 months ago
- Impersonate Tokens using only NTAPI functions☆84Apr 4, 2025Updated 10 months ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆116Feb 17, 2026Updated last week