Bitnet / Bitnet-labsLinks
Offensive Security & Red Teaming Labs and Projects
☆22Updated last week
Alternatives and similar repositories for Bitnet-labs
Users that are interested in Bitnet-labs are comparing it to the libraries listed below
Sorting:
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Updated 3 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆17Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 5 months ago
- Vast.ai Password Kracking☆84Updated 2 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆101Updated 4 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆92Updated 5 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 5 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Updated 3 months ago
- ☆65Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated 11 months ago
- ☆67Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆71Updated last year
- ☆124Updated 2 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆124Updated 5 months ago
- Information stealer logs parser☆75Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 8 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 4 months ago
- ☆54Updated 7 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆59Updated last month
- A meta-list of public references to threat actor profiles and APT group datasets.☆68Updated 2 months ago
- A collection of tools that I use in CTF's or for assessments☆101Updated 7 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆56Updated last month
- Tor onion address lookup☆53Updated 2 weeks ago
- An archive of 0day.today exploits☆162Updated last month
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last week
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year