0x25bit / byobLinks
BYOB (Build Your Own Botnet)
☆10Updated 7 years ago
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆305Updated 4 years ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆408Updated 2 years ago
- An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S0…☆872Updated 10 months ago
- Red Team PowerShell Script☆334Updated 2 years ago
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆355Updated 2 weeks ago
- Hashcat Cheatsheet for OSCP☆619Updated 5 years ago
- Wordlist, rules and masks from Kaonashi project (RootedCON 2019)☆1,059Updated 3 years ago
- Hide your payload into .jpg file☆396Updated 3 years ago
- Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info☆460Updated 11 months ago
- Running Hashcat on Google Colab with session backup and restore.☆741Updated 3 years ago
- Update Version 3.1 added free SMS messaging.☆492Updated 3 years ago
- Fix the Issue (OS can not detect HDMI monitors)☆12Updated 4 years ago
- Zero Infrastructure Password Cracking☆409Updated last year
- Shodan Eye This tool collects all the information about all devices directly connected to the internet using the specified keywords that …☆934Updated last year
- Hydra Password Cracking Cheetsheet☆405Updated 4 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆954Updated 2 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆128Updated last year
- A simple wordlists generator and mangler written in Python 3.10.1.☆122Updated last year
- Fetch, install and search wordlist archives from websites and torrent peers.☆515Updated last year
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆143Updated last year
- Post-exploitation tool to cover your tracks on a compromised machine (beta)☆408Updated 2 years ago
- One rule to crack all passwords. or atleast we hope so.☆1,559Updated 3 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,526Updated 3 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆502Updated last year
- Collection of cracked malware, and ebooks☆662Updated 3 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,219Updated 2 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆352Updated 3 years ago
- The Shadow Attack Framework☆1,117Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,753Updated 7 months ago
- CrackerJack / Hashcat Web Interface / Context Information Security☆371Updated last year