b3rito / b3aconLinks
b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.
β35Updated last month
Alternatives and similar repositories for b3acon
Users that are interested in b3acon are comparing it to the libraries listed below
Sorting:
- Protection against HTML smuggling attacks.β96Updated this week
- πͺ Windows β‘οΈ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during uβ¦β35Updated 2 weeks ago
- Addon for BHCEβ45Updated 2 months ago
- Persist like a Dodderβ60Updated 2 weeks ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishingβ48Updated 2 months ago
- CaptainCredz is a modular and discreet password-spraying tool.β110Updated 3 weeks ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β84Updated 2 months ago
- π An up-to-date collection of precompiled binaries and hacking scripts.β41Updated 4 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β29Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β41Updated 9 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails cβ¦β166Updated 7 months ago
- SprayShark is a modular G-Suite password sprayer with threading!β38Updated 2 weeks ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β108Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ46Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.β143Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ89Updated 2 months ago
- Living Off Security Toolsβ45Updated 7 months ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filtersβ82Updated 2 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocketβ75Updated last month
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β37Updated this week
- Advanced phishing tool, browser-based data capture, and realistic login page emulation.β1Updated last month
- β77Updated last year
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.β20Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3β82Updated last month
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β120Updated last year
- C2 writen in Rust & Go powered by Tor network.β59Updated this week
- BlueSky OSINT Toolβ14Updated 5 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.β47Updated 4 months ago
- Living off the land searches for explorer and sharepointβ83Updated last month