Bitnet / Bitnet-labsLinks
Offensive Security & Red Teaming Labs and Projects
☆25Updated 2 months ago
Alternatives and similar repositories for Bitnet-labs
Users that are interested in Bitnet-labs are comparing it to the libraries listed below
Sorting:
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 7 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 5 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 6 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆183Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 7 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Updated 5 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆85Updated last week
- Vast.ai Password Kracking☆88Updated 3 weeks ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆81Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 7 months ago
- ☆61Updated last year
- Offensive Model AI Agent☆45Updated 3 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Updated 2 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆108Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆300Updated this week
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆150Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- ☆47Updated 4 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆128Updated 7 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆44Updated 4 months ago
- PoC that downloads an executable from a public SSL certificate☆131Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ☆144Updated last month
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 7 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 10 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆124Updated last year
- ☆24Updated 8 months ago