mrd0x / BITBLinks
Browser In The Browser (BITB) Templates
☆2,848Updated last year
Alternatives and similar repositories for BITB
Users that are interested in BITB are comparing it to the libraries listed below
Sorting:
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,485Updated 3 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,344Updated 8 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,249Updated 4 months ago
- Ready to go Phishing Platform☆1,062Updated 5 months ago
- a drop-in replacement for Nmap powered by shodan.io☆3,111Updated 5 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,155Updated this week
- The Havoc Framework☆7,872Updated 3 months ago
- Codebase to generate an msdt-follina payload☆1,623Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,466Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,921Updated 2 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,787Updated 2 years ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,711Updated last week
- evilginx3 + gophish☆1,879Updated last year
- Wi-Fi Exploitation Framework☆2,606Updated 2 weeks ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,382Updated 7 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,600Updated 7 months ago
- A simple python packer to easily bypass Windows Defender☆646Updated 3 years ago
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,625Updated 3 years ago
- Network Analysis Tool☆3,283Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆918Updated 3 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,729Updated last year
- Fake Windows logon screen to steal passwords☆1,365Updated 5 years ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,652Updated 11 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,359Updated 4 months ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,145Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,607Updated 3 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,907Updated this week
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,015Updated last week
- Scanning APK file for URIs, endpoints & secrets.☆5,644Updated last month
- Gather and update all available and newest CVEs with their PoC.☆7,264Updated this week