benyG / Beefstrike
Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.
☆21Updated 8 years ago
Alternatives and similar repositories for Beefstrike:
Users that are interested in Beefstrike are comparing it to the libraries listed below
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Remote Administration Tool for Windows☆17Updated 9 years ago
- ☆24Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- Massive arsenal of hacker tools...☆77Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆33Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- ☆79Updated last year
- Package manager for hackers built by hackers☆35Updated 6 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- ☆19Updated 7 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- Trying to be the best tool to search for exploits in the terminal.☆19Updated 2 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago