Termitty / termittyLinks
The terminal automation framework
☆41Updated 5 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- Windows anti-debugging sandbox☆35Updated 3 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆131Updated 5 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A fork of the Go language with some tweaks☆52Updated 9 months ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆15Updated last month
- Protection against HTML smuggling attacks.☆99Updated 3 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆39Updated 6 months ago
- ☆43Updated 3 months ago
- ☆173Updated 2 months ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆120Updated 3 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆38Updated this week
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆211Updated 2 weeks ago
- Putting a leash on naughty AWS permissions☆130Updated last month
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 3 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆94Updated last month
- BlueSky OSINT Tool☆14Updated 10 months ago
- An OpenAI API Compatible Honeypot Gateway☆16Updated 7 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆57Updated 3 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆28Updated 2 weeks ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆37Updated last month
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- Hijack a slack bot to phish your way in☆57Updated 3 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 5 months ago
- Minimal workflows☆20Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆85Updated last month
- Simple reverse ICMP shell☆14Updated last year
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆151Updated last month
- Configurable, Community driven, HTTP C2 Profile☆27Updated 5 months ago
- HTML Smuggling with Web Assembly☆64Updated last year