C2 Server for pentesting, exploitation, and payload creation
☆12Jul 17, 2024Updated last year
Alternatives and similar repositories for TITANII
Users that are interested in TITANII are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Blacklist for Crypto Wallet scams and Newly Registered Domains☆12Nov 6, 2024Updated last year
- auto MITM attack tools☆14Oct 11, 2023Updated 2 years ago
- Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cy…☆10Jun 2, 2024Updated last year
- Networking (Ethernet, TCP/IP, IPv6) over Xbee long-distance radios☆16Dec 15, 2020Updated 5 years ago
- A role play mod for DayZ. See website for detailed informations☆11Jan 4, 2026Updated 2 months ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- itdog批量ping爬虫☆22Nov 16, 2024Updated last year
- Computer Graphic Midterm - Indra Imanuel Gunawan / 20195118☆13May 5, 2020Updated 5 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- Python 3 Script to Indent SQF Code, also decent to de-obfuscate sqf code☆10Jan 21, 2015Updated 11 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- A custom SentinelOne USB scanner.☆19Mar 26, 2022Updated 3 years ago
- Zero downtime restart and graceful shutdown in one line of code☆11Jul 24, 2020Updated 5 years ago
- Tool for MS SQL Man In The Middle attack which supports TLS encryption.☆30Oct 2, 2024Updated last year
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Scripts I've made as a desktop support/AD admin to help me and my clients.☆30Apr 4, 2025Updated 11 months ago
- Standalone, local-runnable binaries of popular linux distributions☆10Dec 15, 2021Updated 4 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Gui grep (and sed) with sessions and history☆15Nov 14, 2025Updated 4 months ago
- OpenAI Security Console - Python3 AI-powered Cybersecurity Framework☆16Mar 25, 2023Updated 2 years ago
- ☆18May 8, 2019Updated 6 years ago
- OpenRAN Gym website☆12Dec 11, 2025Updated 3 months ago
- Lightweight Linux for Docker☆11Nov 20, 2018Updated 7 years ago
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- Repository for my PowerShell scripts☆28Mar 12, 2024Updated 2 years ago
- ☆18Apr 15, 2025Updated 11 months ago
- This repository contains some modified gap.c file options of the Flipper's BLE function, which can be used to simulate ADV Packet Spoofin…☆16Sep 9, 2023Updated 2 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- ☆20Feb 1, 2026Updated last month
- Docker environment for hackers☆17Jun 20, 2020Updated 5 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- An RF stack for building exfiltration systems.☆18Oct 24, 2018Updated 7 years ago
- Runs nmap on the LAN and then generates a basic ASCII network diagram, a 'hand drawn' network diagram and an bootstrap themed web report …☆23Feb 12, 2026Updated last month
- Creating a remote keylogger in Python and disguising the executable as a JPEG.☆13Aug 30, 2023Updated 2 years ago
- ☆20Feb 5, 2026Updated last month
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago