mrd0x / BITBLinks
Browser In The Browser (BITB) Templates
☆2,824Updated last year
Alternatives and similar repositories for BITB
Users that are interested in BITB are comparing it to the libraries listed below
Sorting:
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,127Updated 2 weeks ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,253Updated 4 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,115Updated 7 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,441Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,401Updated 7 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,775Updated 2 years ago
- The Havoc Framework☆7,584Updated 4 months ago
- Ready to go Phishing Platform☆975Updated last month
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,616Updated 2 weeks ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,443Updated last year
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,145Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,033Updated 3 years ago
- evilginx3 + gophish☆1,800Updated 11 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,095Updated 5 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,051Updated last week
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,109Updated 2 weeks ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆3,419Updated 2 years ago
- The Network Execution Tool☆4,239Updated last week
- a drop-in replacement for Nmap powered by shodan.io☆3,043Updated last month
- Scanning APK file for URIs, endpoints & secrets.☆5,312Updated 2 months ago
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,569Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,893Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,375Updated 4 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,822Updated last year
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,686Updated 10 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,014Updated 2 years ago
- An OOB interaction gathering server and client library☆3,790Updated last week
- Trying to tame the three-headed dog.☆4,479Updated last month
- A collaborative, multi-platform, red teaming framework☆3,707Updated this week