malwaredllc / byobLinks
An open-source post-exploitation framework for students, researchers and developers.
☆9,348Updated last week
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- ☆1,948Updated 2 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,270Updated 3 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,267Updated 6 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,889Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,434Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,448Updated 7 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,174Updated 2 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,349Updated 9 months ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,511Updated last year
- A Workflow Engine for Offensive Security☆5,977Updated 4 months ago
- Automated Mass Exploiter☆5,173Updated 2 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,829Updated 3 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,182Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,379Updated 4 years ago
- Attack Surface Management Platform☆9,258Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,438Updated 11 months ago
- E-mails, subdomains and names Harvester - OSINT☆15,155Updated last week
- UFONet - Denial of Service Toolkit☆2,398Updated last year
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,276Updated 6 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,556Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,740Updated 2 years ago
- Python botnet and backdoor☆1,601Updated 2 years ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,817Updated 6 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,861Updated last week
- an awesome list of honeypot resources☆9,943Updated 8 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,794Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,179Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,963Updated 2 months ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,498Updated 3 weeks ago
- The LAZY script will make your life easier, and of course faster.☆4,278Updated 4 years ago