A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms
☆25Feb 22, 2026Updated last month
Alternatives and similar repositories for GlytchC2
Users that are interested in GlytchC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆118Jan 21, 2026Updated 2 months ago
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆94Jan 14, 2026Updated 2 months ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Apr 3, 2023Updated 3 years ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Postgres functions for arithmetic on numeric arrays☆16Mar 28, 2025Updated last year
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- Android Debug Bridge (ADB) over Piping Serer on Web browser☆23Nov 14, 2023Updated 2 years ago
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Emoji-cheat-sheet converter for Python☆10Dec 29, 2014Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- RidgeRun demo presented at the GTC 2020 online conference☆12Jul 23, 2020Updated 5 years ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- Provides an ensemble model to deploy a YOLOv8 TensorRT model to Triton☆13Mar 28, 2024Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 10 months ago
- A (purpousely) vulnerable, social-media-like, django web application☆12Jun 10, 2021Updated 4 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Attack tool for altering packed samples so that they evade static packing detection☆22Jan 26, 2025Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Welcome! I'm Alparslan Akyıldız, an author focusing on cybersecurity and technology. Explore my guides, books, and texts designed to simp…☆72Mar 26, 2025Updated last year
- deepstream python play rtsp h264☆14Jan 10, 2022Updated 4 years ago
- Unofficial wheels for some machine-learning Python libraries, for the Nvidia Jetson Nano.☆17Aug 24, 2021Updated 4 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Powerful infrastructure development tool based on Ansible☆15Updated this week
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Code supporting capabilities blog☆20Sep 25, 2019Updated 6 years ago
- ☆38Aug 6, 2025Updated 8 months ago
- ☆16Dec 20, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A game for Ludum Dare 49☆16Oct 5, 2021Updated 4 years ago
- Backup your TikTok videos. Download your favorite and posted videos or any public profile videos.☆24Mar 21, 2026Updated 3 weeks ago
- morse keyboard I made, kinda as a joke☆13Dec 1, 2023Updated 2 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆75Sep 13, 2025Updated 6 months ago
- Template for obsidian second brain☆17Aug 24, 2025Updated 7 months ago
- ☆17Dec 25, 2024Updated last year
- NVIDIA Jetson amd Deepstream Python Examples☆22Jun 23, 2021Updated 4 years ago