her3ticAVI / TITANIILinks
C2 Server for pentesting, exploitation, and payload creation
☆12Updated last year
Alternatives and similar repositories for TITANII
Users that are interested in TITANII are comparing it to the libraries listed below
Sorting:
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Updated 2 years ago
- Windows Privilege Escalation Tool☆18Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆27Updated 11 months ago
- Remote Administration Tool made in golang language.☆11Updated 2 years ago
- Social Engineering Browser Update Attack.☆58Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆65Updated 2 years ago
- An interactive mock C2 server☆17Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- A compact and simple program targeting SIMATIC S7 Programmable Logic Controllers (PLCs) written in Go. Allowing for cross-compilation to …☆57Updated 10 months ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆64Updated 2 months ago
- Remote Command executor☆81Updated 2 years ago
- A reconnaissance tool for ethical hackers written in RUST☆20Updated last year
- Pentest scriptkit for your copypasta☆13Updated 6 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆135Updated last year
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆64Updated 4 years ago
- A simple stiller with sending logs to your EMAIL, in case of inactivity, write to me in Discord- R3VENGE#1539☆59Updated 2 years ago
- Windows And Ways To Break It☆101Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆33Updated 3 years ago
- Legba recipes.☆51Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- Discord C2 for Redteam....Need a better name☆135Updated 2 years ago
- Havoc python api☆43Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆137Updated last year
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numb…☆159Updated this week
- Polymorphic Command & Control☆101Updated 8 months ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Updated last year