malwaredllc / byob
An open-source post-exploitation framework for students, researchers and developers.
☆9,149Updated last month
Alternatives and similar repositories for byob:
Users that are interested in byob are comparing it to the libraries listed below
- ☆1,876Updated last year
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,412Updated last year
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,669Updated last year
- The LAZY script will make your life easier, and of course faster.☆4,176Updated 3 years ago
- E-mails, subdomains and names Harvester - OSINT☆12,454Updated last week
- Attack Surface Management Platform☆8,679Updated last month
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,769Updated 11 months ago
- Automated Mass Exploiter☆5,109Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,606Updated this week
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,940Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,166Updated 10 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,186Updated 2 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,329Updated 4 years ago
- A swiss army knife for pentesting networks☆8,694Updated last year
- UFONet - Denial of Service Toolkit☆2,321Updated 8 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,273Updated 7 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆4,994Updated 2 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,658Updated 4 years ago
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,586Updated 5 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,677Updated last week
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆2,952Updated this week
- Common User Passwords Profiler (CUPP)☆4,745Updated last year
- In-depth attack surface mapping and asset discovery☆12,840Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,222Updated last week
- hydra☆10,324Updated 3 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,265Updated 6 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,164Updated 7 months ago
- Python Remote Administration Tool (RAT)☆3,286Updated last year
- Next generation web scanner☆5,833Updated 9 months ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆14,206Updated 4 months ago