Termitty / termittyLinks
The terminal automation framework
☆41Updated 8 months ago
Alternatives and similar repositories for termitty
Users that are interested in termitty are comparing it to the libraries listed below
Sorting:
- Windows anti-debugging sandbox☆39Updated last month
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆44Updated 9 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆265Updated last month
- Ebyte-Go-Morpher is a Go program that parses, analyzes, and rewrites Go source code to apply multiple layers of obfuscation. It operates …☆121Updated 6 months ago
- Protection against HTML smuggling attacks.☆101Updated 6 months ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆16Updated 2 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134Updated 8 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆40Updated 2 months ago
- ☆43Updated 6 months ago
- A fork of the Go language with some tweaks☆55Updated last year
- 🔒 Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built wi…☆89Updated last month
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆105Updated 5 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 6 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- ☆59Updated last month
- ☆186Updated 2 months ago
- Identify Azure AD resources that issue tokens without MFA enforcement using the ROPC grant flow.☆83Updated this week
- A slightly more fun way to disable windows defender☆52Updated 9 months ago
- Malware traffic obfuscation library☆38Updated 6 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated last month
- A Qemu Proxmox Template builder project using Packer☆70Updated 2 months ago
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆68Updated last month
- BlueSky OSINT Tool☆14Updated last year
- Minimal workflows☆20Updated last year
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆40Updated 4 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆109Updated 8 months ago