The Browser Exploitation Framework Project
☆10,796Apr 3, 2026Updated this week
Alternatives and similar repositories for beef
Users that are interested in beef are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Metasploit Framework☆37,850Updated this week
- Automatic SQL injection and database takeover tool☆36,984Mar 30, 2026Updated last week
- A little tool to play with Windows security☆21,380May 11, 2025Updated 10 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,834Jan 19, 2020Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14,735Oct 21, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,939Aug 17, 2020Updated 5 years ago
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,853Nov 10, 2022Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆15,608Updated this week
- Most advanced XSS scanner.☆14,872Apr 26, 2025Updated 11 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,213Oct 9, 2023Updated 2 years ago
- Nikto web server scanner☆10,228Mar 20, 2026Updated 3 weeks ago
- Exploitation Framework for Embedded Devices☆13,066Mar 2, 2026Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆70,044Updated this week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Automated All-in-One OS Command Injection Exploitation Tool☆5,700Updated this week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,960Mar 22, 2024Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆15,965Updated this week
- Six Degrees of Domain Admin☆10,551Mar 2, 2026Updated last month
- Framework for Man-In-The-Middle attacks☆3,634Aug 28, 2018Updated 7 years ago
- Web application fuzzer☆6,464Jan 21, 2026Updated 2 months ago
- Web path scanner☆14,156Mar 16, 2026Updated 3 weeks ago
- WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websit…☆9,529Feb 16, 2026Updated last month
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆19,019Mar 29, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,937May 3, 2022Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,830Apr 25, 2024Updated last year
- Attack Surface Management Platform☆9,650Feb 15, 2026Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,852Jun 15, 2020Updated 5 years ago
- w3af: web application attack and audit framework, the open source web vulnerability scanner.☆4,859Feb 22, 2023Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,116Mar 17, 2024Updated 2 years ago
- Open-Source Phishing Toolkit☆13,687Sep 23, 2024Updated last year
- Next generation web scanner☆6,480Apr 2, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,837Dec 4, 2025Updated 4 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆6,272Mar 26, 2026Updated 2 weeks ago
- hydra☆11,765Feb 7, 2026Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆14,353Apr 1, 2026Updated last week
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆25,485Mar 31, 2026Updated last week
- Fast subdomains enumeration tool for penetration testers☆10,871Aug 2, 2024Updated last year
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,679Jan 5, 2026Updated 3 months ago