malwaredllc / byobLinks
An open-source post-exploitation framework for students, researchers and developers.
☆9,208Updated last week
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- Attack Surface Management Platform☆8,818Updated 2 weeks ago
- ☆1,889Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,139Updated last year
- The LAZY script will make your life easier, and of course faster.☆4,212Updated 3 years ago
- Python Remote Administration Tool (RAT)☆3,350Updated last year
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,207Updated 2 years ago
- A Workflow Engine for Offensive Security☆5,652Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,737Updated last year
- Rewrite of the popular wireless network auditor, "wifite"☆7,009Updated 10 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,198Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,606Updated last month
- This is a multi-use bash script for Linux systems to audit wireless networks.☆6,988Updated this week
- List of Awesome Red Teaming Resources☆7,293Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆6,468Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,638Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,207Updated 5 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,083Updated 9 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,653Updated 6 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,130Updated 5 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,119Updated last year
- Modlishka. Reverse Proxy.☆5,013Updated 3 weeks ago
- Exploitation Framework for Embedded Devices☆12,608Updated last week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,724Updated 3 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,312Updated this week
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,099Updated 10 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,843Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,276Updated 2 months ago
- Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.☆2,320Updated 9 months ago
- Web application fuzzer☆6,194Updated 10 months ago
- Fast subdomains enumeration tool for penetration testers☆10,414Updated 10 months ago