A FAFO project: Command execution and data exfiltration of any kind through live streaming platforms
☆25Feb 22, 2026Updated last month
Alternatives and similar repositories for GlytchC2
Users that are interested in GlytchC2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Blackdagger is a DAG-based automation tool specifically used in DevOps, DevSecOps, MLOps, MLSecOps, and Continuous Red Teaming (CART).☆117Jan 21, 2026Updated 2 months ago
- Custom Black arch based docker container for continuous automated red teaming☆24Jan 21, 2026Updated 2 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated 2 months ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- ☆49Nov 25, 2025Updated 3 months ago
- Bu bir not defteri programıdır. Sayfalar halinde not tutmanızı sağlar ve sadece Linux işletim sistemi için hazırlanmıştır. Yazdığınız not…☆13Apr 13, 2025Updated 11 months ago
- Java and Android mobile alerting and secure wipe application(s)☆24Oct 8, 2011Updated 14 years ago
- Android Debug Bridge (ADB) over Piping Serer on Web browser☆22Nov 14, 2023Updated 2 years ago
- Emoji-cheat-sheet converter for Python☆10Dec 29, 2014Updated 11 years ago
- 🔍 erroreyes – Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains ass…☆16May 8, 2025Updated 10 months ago
- Cross Compatible Command and Control☆47Dec 18, 2025Updated 3 months ago
- UFSIT scripts and tools for hardening and auditing☆14May 28, 2025Updated 9 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Download your liked TikTok videos.☆18Dec 29, 2021Updated 4 years ago
- Attack tool for altering packed samples so that they evade static packing detection☆22Jan 26, 2025Updated last year
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 8 months ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A game made for Ludum Dare 49☆17Oct 13, 2021Updated 4 years ago
- ☆13Aug 1, 2023Updated 2 years ago
- Powerful infrastructure development tool based on Ansible☆15Updated this week
- ☆38Aug 6, 2025Updated 7 months ago
- C subset compiler written in ruby.☆12Oct 6, 2021Updated 4 years ago
- A game for Ludum Dare 49☆16Oct 5, 2021Updated 4 years ago
- morse keyboard I made, kinda as a joke☆13Dec 1, 2023Updated 2 years ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆73Sep 13, 2025Updated 6 months ago
- Template for obsidian second brain☆17Aug 24, 2025Updated 7 months ago
- ☆17Dec 25, 2024Updated last year
- Simple idea capturing web app☆90Mar 3, 2015Updated 11 years ago
- A web-based GUI for Minecraft Server Control (PROOF OF CONCEPT)☆13Aug 3, 2020Updated 5 years ago
- Fully dockerized environment For Ansible's Labs☆15Dec 13, 2023Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 9 months ago
- Securing your Obsidian vault, one plugin at a time☆17Aug 23, 2024Updated last year
- ☆15May 16, 2025Updated 10 months ago
- ☆10Feb 24, 2025Updated last year
- Synergy GSC Mod Menu for Infinite Warfare☆22Updated this week
- A helper utility for https://github.com/ThoNohT/NohBoard☆13Apr 22, 2015Updated 10 years ago