GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured systems.
☆18Jan 26, 2026Updated last month
Alternatives and similar repositories for gtfocli
Users that are interested in gtfocli are comparing it to the libraries listed below
Sorting:
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆26Dec 23, 2025Updated 2 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- ☆26Apr 30, 2010Updated 15 years ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Jul 25, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Oct 10, 2022Updated 3 years ago
- A nim implementation of sRDI☆20Oct 18, 2023Updated 2 years ago
- Damn Vulnerable SCA Application☆43Mar 3, 2026Updated 2 weeks ago
- ☆28Jan 6, 2024Updated 2 years ago
- gRPC client for the Merlin Server☆27Apr 17, 2025Updated 11 months ago
- ☆44Updated this week
- windows自动监控截图工具。 windows automatic screenshoter.☆21Mar 26, 2024Updated last year
- ☆38Jan 7, 2025Updated last year
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- CVE-2024-24576 Proof of Concept☆20Apr 10, 2024Updated last year
- Timestomp Tool to flatten MAC times with a specific timestamp☆50Dec 7, 2025Updated 3 months ago
- PENGUIN (Personalized EmulatioN Generated Using Instrumented Analysis) takes a target centric approach to rehosting using a precise and t…☆54Updated this week
- 一个可以自定规则的动扫描器,支持主动和被动扫描☆25Oct 26, 2021Updated 4 years ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆97Feb 3, 2026Updated last month
- Microsoft Developer Blogs Search Tool☆25Apr 24, 2025Updated 10 months ago
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Remote Template Injection Toolkit☆48Apr 7, 2024Updated last year
- Advanced Proxy Switcher & Header Modifier☆26May 28, 2025Updated 9 months ago
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- I want to say please and thank you to Claude, but I don't want to waste tokens on it.☆27Feb 18, 2026Updated last month
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- Impersonate Windows tokens in Nim☆23Aug 4, 2025Updated 7 months ago
- Automatic authorization enforcement detection extension for burp suite written in Jython developed by Barak Tawily in order to ease appli…☆32Dec 7, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆18Mar 15, 2026Updated last week
- ☆27Aug 18, 2023Updated 2 years ago
- Adding minimap functionality to CodeMirror☆15Jan 18, 2013Updated 13 years ago