malwaredllc / byobLinks
An open-source post-exploitation framework for students, researchers and developers.
☆9,245Updated last week
Alternatives and similar repositories for byob
Users that are interested in byob are comparing it to the libraries listed below
Sorting:
- ☆1,903Updated 2 years ago
- Automated Mass Exploiter☆5,150Updated 2 years ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,219Updated 2 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,225Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,410Updated last year
- Attack Surface Management Platform☆8,957Updated 2 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,113Updated 11 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,554Updated 2 years ago
- The LAZY script will make your life easier, and of course faster.☆4,238Updated 3 years ago
- This is a multi-use bash script for Linux systems to audit wireless networks.☆7,099Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,043Updated 8 months ago
- E-mails, subdomains and names Harvester - OSINT☆13,189Updated this week
- A Workflow Engine for Offensive Security☆5,782Updated last week
- articles☆13,269Updated 2 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆11,414Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,358Updated 4 years ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,960Updated last week
- Most advanced XSS scanner.☆14,224Updated 3 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆10,424Updated last year
- A swiss army knife for pentesting networks☆8,859Updated last year
- Awesome hacking is an awesome collection of hacking tools.☆3,365Updated 2 months ago
- Incredibly fast crawler designed for OSINT.☆11,802Updated 4 months ago
- In-depth attack surface mapping and asset discovery☆13,401Updated last week
- Know the dangers of credential reuse attacks.☆2,064Updated 10 months ago
- 💤 Kick devices off your network by performing an ARP Spoof attack.☆2,616Updated 2 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,846Updated 3 months ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,192Updated 8 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,134Updated last year
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆12,215Updated 9 months ago
- Exploitation Framework for Embedded Devices☆12,706Updated 2 months ago