byt3n33dl3 / GrizzlyLinks
worlds most advanced GUI applications for C2 and remote-access, based on trojan's malware.
☆13Updated 7 months ago
Alternatives and similar repositories for Grizzly
Users that are interested in Grizzly are comparing it to the libraries listed below
Sorting:
- Encrypting directory and access. Execute the commands based on external inputs RCE, single-C2 and key-logging.☆11Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.☆21Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Updated 11 months ago
- Yarn BHCE by using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling attack path discovery.☆55Updated 10 months ago
- Github Profile Readme (https://byt3n33dl3.substack.com/)☆36Updated last month
- Offshore for LLMNR/NBT-NS Poisoning and abuse for PrivEsc.☆27Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.☆30Updated last year
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.