her3ticAVI / TITANIILinks
C2 Server for pentesting, exploitation, and payload creation
☆12Updated last year
Alternatives and similar repositories for TITANII
Users that are interested in TITANII are comparing it to the libraries listed below
Sorting:
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Updated 2 years ago
- Windows Privilege Escalation Tool☆18Updated last year
- An interactive mock C2 server☆17Updated 2 years ago
- Pentest scriptkit for your copypasta☆13Updated 7 months ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Remote Administration Tool made in golang language.☆11Updated 2 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- Remote Command executor☆81Updated 2 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆64Updated 3 months ago
- UAC Bypass using CMSTP in Rust☆34Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated last year
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Updated 2 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Updated 4 months ago
- Windows And Ways To Break It☆101Updated 2 years ago
- RedLizard Rust TCP Reverse Shell Server/Client☆140Updated 2 years ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 3 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆49Updated 3 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆58Updated 11 months ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago