malwaredllc / byobLinks
An open-source post-exploitation framework for students, researchers and developers.
☆9,423Updated 2 weeks ago
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- ☆1,979Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,932Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,997Updated last year
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,286Updated 3 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,386Updated 5 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,523Updated 3 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,842Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,516Updated 2 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,478Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,816Updated last month
- Automated Mass Exploiter☆5,205Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,573Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,222Updated last year
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,211Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,798Updated 6 years ago
- Python botnet and backdoor☆1,610Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,105Updated 4 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,607Updated last year
- P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.☆4,344Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,790Updated 7 months ago
- A swiss army knife for pentesting networks☆9,050Updated 2 years ago
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,015Updated 11 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,505Updated 8 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,433Updated this week
- Credentials recovery project☆10,641Updated 4 months ago
- A Modern Orchestration Engine for Security☆6,070Updated this week
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,766Updated last year
- Veil 3.1.X (Check version info in Veil at runtime)☆4,197Updated 2 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,826Updated 5 years ago
- Common User Passwords Profiler (CUPP)☆5,734Updated last month