Termitty / termittyLinks
The terminal automation framework
☆40Updated 2 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆128Updated 3 months ago
- A fork of the Go language with some tweaks☆51Updated 6 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆92Updated 3 weeks ago
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆31Updated 2 weeks ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆37Updated 3 months ago
- An OpenAI API Compatible Honeypot Gateway☆16Updated 4 months ago
- Hijack a slack bot to phish your way in☆56Updated 3 weeks ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆84Updated this week
- Pentester-focused Docker registry tool to enumerate and pull images☆21Updated this week
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆45Updated 3 weeks ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆80Updated last month
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆99Updated 2 months ago
- ☆39Updated 3 weeks ago
- ☆17Updated 6 months ago
- Simple reverse ICMP shell☆14Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆85Updated 5 months ago
- A distributed hashcat implementation using Salad Cloud and Hashtopolis☆40Updated last year
- Minimal workflows☆19Updated last year
- Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephe…☆219Updated last month
- ☆155Updated this week
- Putting a leash on naughty AWS permissions☆127Updated 3 months ago
- HTML Smuggling with Web Assembly☆63Updated last year
- A new AiTM attack framework — based on leveraging service workers — designed to conduct credential phishing campaigns. Thanks to its mini…☆64Updated this week
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆66Updated last year
- Addon for BHCE☆50Updated 4 months ago
- Asynchronous NFSv3 client in pure Python☆26Updated 3 weeks ago
- Nemesis agent for Mythic☆27Updated 11 months ago
- Use LLMs for document ranking☆145Updated 3 months ago