mrd0x / BITBLinks
Browser In The Browser (BITB) Templates
☆2,876Updated 2 years ago
Alternatives and similar repositories for BITB
Users that are interested in BITB are comparing it to the libraries listed below
Sorting:
- Ready to go Phishing Platform☆1,100Updated 9 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,412Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆3,175Updated 9 months ago
- Codebase to generate an msdt-follina payload☆1,634Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,599Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,189Updated 4 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,816Updated last month
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,320Updated 8 months ago
- Dangerously fast DNS/network/port scanner☆922Updated 3 years ago
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,670Updated 3 years ago
- Wi-Fi Exploitation Framework☆2,761Updated 4 months ago
- A simple python packer to easily bypass Windows Defender☆648Updated 3 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,076Updated 4 years ago
- evilginx3 + gophish☆1,949Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Updated 3 years ago
- Modlishka. Reverse Proxy.☆5,257Updated last month
- The Havoc Framework☆8,140Updated last month
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,398Updated 11 months ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,145Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,676Updated last year
- Notion as a platform for offensive operations☆1,177Updated 2 years ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,109Updated last year
- Offensive Software Exploitation Course☆2,396Updated 2 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,683Updated last year
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆1,042Updated last year
- Adversary Emulation Framework☆10,635Updated last week
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Hel…☆676Updated 3 years ago