mrd0x / BITB
Browser In The Browser (BITB) Templates
☆2,817Updated last year
Alternatives and similar repositories for BITB:
Users that are interested in BITB are comparing it to the libraries listed below
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,177Updated 2 months ago
- evilginx3 + gophish☆1,750Updated 9 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,964Updated 2 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,753Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,269Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆2,990Updated last month
- The Havoc Framework☆7,381Updated 2 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,546Updated 2 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,881Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,942Updated 3 weeks ago
- An OOB interaction gathering server and client library☆3,664Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,268Updated this week
- The ultimate WinRM shell for hacking/pentesting☆4,775Updated 3 months ago
- Wi-Fi Exploitation Framework☆2,507Updated 6 months ago
- Scanning APK file for URIs, endpoints & secrets.☆5,202Updated this week
- Generates millions of keyword-based password mutations in seconds.☆1,274Updated 7 months ago
- The Network Execution Tool☆3,714Updated this week
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,137Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆6,839Updated this week
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,644Updated 8 months ago
- a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax )☆2,295Updated last month
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,388Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,795Updated last year
- Codebase to generate an msdt-follina payload☆1,620Updated 2 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,438Updated last month
- Dangerously fast DNS/network/port scanner☆897Updated 3 years ago
- Adversary Emulation Framework☆9,104Updated this week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆1,791Updated last year
- Rockyou for web fuzzing☆2,746Updated last month
- Ready to go Phishing Platform☆941Updated 3 weeks ago