malwaredllc / byob
An open-source post-exploitation framework for students, researchers and developers.
☆9,060Updated last month
Alternatives and similar repositories for byob:
Users that are interested in byob are comparing it to the libraries listed below
- ☆1,851Updated last year
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,684Updated 10 months ago
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,181Updated last week
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,569Updated 10 months ago
- Python Remote Administration Tool (RAT)☆3,201Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,304Updated 4 years ago
- Automated Mass Exploiter☆5,070Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆63,089Updated this week
- Veil 3.1.X (Check version info in Veil at runtime)☆4,052Updated last year
- Attack Surface Management Platform☆8,387Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,275Updated 5 months ago
- Official Black Hat Arsenal Security Tools Repository☆3,977Updated 5 months ago
- Framework for Man-In-The-Middle attacks☆3,591Updated 6 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆4,989Updated last month
- Common User Passwords Profiler (CUPP)☆4,616Updated last year
- A Workflow Engine for Offensive Security☆5,459Updated this week
- A swiss army knife for pentesting networks☆8,565Updated last year
- The LAZY script will make your life easier, and of course faster.☆4,125Updated 3 years ago
- Exploitation Framework for Embedded Devices☆12,337Updated 2 weeks ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,225Updated 4 months ago
- Rewrite of the popular wireless network auditor, "wifite"☆6,660Updated 5 months ago
- E-mails, subdomains and names Harvester - OSINT☆11,974Updated this week
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,160Updated 2 years ago
- In-depth attack surface mapping and asset discovery☆12,442Updated this week
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,135Updated 8 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,490Updated this week
- Powerful framework for rogue access point attack.☆2,065Updated last year
- The Browser Exploitation Framework Project☆10,030Updated this week
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆6,295Updated 6 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,530Updated 5 years ago