malwaredllc / byob
An open-source post-exploitation framework for students, researchers and developers.
☆8,990Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for byob
- ☆1,837Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,091Updated 5 months ago
- Automated Mass Exploiter☆5,037Updated last year
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,136Updated 2 years ago
- Attack Surface Management Platform☆8,132Updated 3 weeks ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,462Updated 7 months ago
- Fast subdomains enumeration tool for penetration testers☆9,883Updated 3 months ago
- Directory/File, DNS and VHost busting tool written in Go☆10,154Updated last week
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,125Updated 5 months ago
- In-depth attack surface mapping and asset discovery☆12,095Updated this week
- The LAZY script will make your life easier, and of course faster.☆4,063Updated 3 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆6,967Updated last month
- Official Black Hat Arsenal Security Tools Repository☆3,920Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆10,934Updated 3 months ago
- Fast web fuzzer written in Go☆12,711Updated 4 months ago
- Web application fuzzer☆5,968Updated 3 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,106Updated 2 months ago
- Python Remote Administration Tool (RAT)☆3,123Updated 10 months ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,187Updated last year
- Know the dangers of credential reuse attacks.☆2,025Updated last month
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,272Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,040Updated last year
- Exploitation Framework for Embedded Devices☆12,215Updated 3 weeks ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,059Updated 4 years ago
- Incredibly fast crawler designed for OSINT.☆11,072Updated 3 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,084Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆13,171Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,487Updated 2 weeks ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,804Updated 6 months ago