GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured systems.
☆18Jan 26, 2026Updated 2 months ago
Alternatives and similar repositories for gtfocli
Users that are interested in gtfocli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Jun 22, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 3 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- ☆11Aug 25, 2018Updated 7 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- URLFUZZ By T00ls.Net☆24Jul 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Damn Vulnerable SCA Application☆43Mar 30, 2026Updated last week
- gRPC client for the Merlin Server☆28Apr 17, 2025Updated 11 months ago
- ☆45Mar 22, 2026Updated 2 weeks ago
- windows自动监控截图工具。 windows automatic screenshoter.☆21Mar 26, 2024Updated 2 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- ☆39Jan 7, 2025Updated last year
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- CVE-2024-24576 Proof of Concept☆20Apr 10, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 4 months ago
- Metabase Pre-auth RCE☆12Aug 3, 2023Updated 2 years ago
- The anonymous credentials zoo☆16Mar 17, 2021Updated 5 years ago
- 一个可以自定规则的动扫描器,支持主动和被动扫描☆26Oct 26, 2021Updated 4 years ago
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 11 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated 2 years ago
- Advanced Proxy Switcher & Header Modifier☆26May 28, 2025Updated 10 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated last month
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 8 months ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆32Dec 7, 2023Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago