malwaredllc / byobLinks
An open-source post-exploitation framework for students, researchers and developers.
☆9,257Updated last week
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- ☆1,914Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,826Updated last year
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,238Updated 3 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,148Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,739Updated this week
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,230Updated 3 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,794Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,351Updated 11 months ago
- Automated Mass Exploiter☆5,156Updated 2 years ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,184Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆10,574Updated last year
- Official Black Hat Arsenal Security Tools Repository☆4,139Updated last year
- Python Remote Administration Tool (RAT)☆3,406Updated last year
- Phishing Tool & Information Collector☆4,489Updated 10 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,543Updated last year
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,458Updated last year
- A swiss army knife for pentesting networks☆8,912Updated last year
- Framework for Man-In-The-Middle attacks☆3,623Updated 7 years ago
- A Workflow Engine for Offensive Security☆5,880Updated last month
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,817Updated 2 years ago
- The LAZY script will make your life easier, and of course faster.☆4,254Updated 4 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,369Updated 4 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,694Updated 10 months ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,148Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,780Updated 7 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,379Updated 5 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,120Updated last month
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,379Updated 11 months ago
- UFONet - Denial of Service Toolkit☆2,370Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,101Updated last week