b3rito / b3acon
b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.
β33Updated 3 weeks ago
Alternatives and similar repositories for b3acon
Users that are interested in b3acon are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.β97Updated last week
- πͺ Windows β‘οΈ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during uβ¦β31Updated 2 weeks ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β29Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matchesβ46Updated 2 months ago
- π An up-to-date collection of precompiled binaries and hacking scripts.β41Updated 3 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β82Updated 2 weeks ago
- SprayShark is a modular G-Suite password sprayer with threading!β36Updated 2 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β82Updated 2 months ago
- Addon for BHCEβ45Updated last month
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Updated 7 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.β109Updated last week
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishingβ47Updated 2 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year
- Living Off Security Toolsβ44Updated 6 months ago
- β77Updated last year
- Automates the network enumeration process in a fire-and-forget manner, among many more functions. Aims to be the illest Nmap/masscan wrapβ¦β53Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β107Updated last month
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β41Updated 8 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.β38Updated 3 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ86Updated last month
- BlueSky OSINT Toolβ13Updated 5 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocketβ74Updated last week
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.β10Updated 6 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β127Updated 2 weeks ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Updated 7 months ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ37Updated 5 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β120Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β70Updated last month
- A small executable to trick a user to authenticate using code matching MFAβ69Updated last year