Python library that facilitates interfacing with BeEF via it's RESTful API
☆79May 18, 2017Updated 8 years ago
Alternatives and similar repositories for BeEF-API
Users that are interested in BeEF-API are comparing it to the libraries listed below
Sorting:
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆86Mar 27, 2019Updated 6 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Python clone of arpspoof that can poison hosts via arp-requests as well as arp-replies☆199Jan 8, 2019Updated 7 years ago
- A shell / chat bot for XMPP and cloud services☆49Oct 10, 2015Updated 10 years ago
- Small Linux command-line tool to "ping" 802.11 devices☆28Aug 29, 2012Updated 13 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- A mirror of the original SSLstrip+ code by Leonardo Nve☆183Jun 29, 2018Updated 7 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 6 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 5 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Jan 25, 2016Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- Fast Wi-Fi hijacker in C, based on AirPwn ideas and LORCON☆22Sep 21, 2017Updated 8 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆105Sep 24, 2014Updated 11 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆56Mar 26, 2019Updated 6 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 8 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 10 years ago
- Rule-creation tool for CiscoRouter Scanner☆16Dec 17, 2014Updated 11 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆284Aug 8, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,348Nov 16, 2018Updated 7 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Dec 6, 2010Updated 15 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- ☆38May 31, 2017Updated 8 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 5 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago