mrd0x / BITBLinks
Browser In The Browser (BITB) Templates
☆2,846Updated last year
Alternatives and similar repositories for BITB
Users that are interested in BITB are comparing it to the libraries listed below
Sorting:
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,303Updated 6 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,086Updated last month
- Codebase to generate an msdt-follina payload☆1,627Updated 3 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,173Updated 2 months ago
- Wi-Fi Exploitation Framework☆2,577Updated last month
- Ready to go Phishing Platform☆1,020Updated 3 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,785Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- evilginx3 + gophish☆1,845Updated last year
- An email spoofing testing tool that aims to bypass SPF/DKIM/DMARC and forge DKIM signatures.🍻☆1,606Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,914Updated last year
- A simple python packer to easily bypass Windows Defender☆644Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,515Updated last month
- Leaked pentesting manuals given to Conti ransomware crooks☆1,046Updated 3 years ago
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,148Updated 2 years ago
- The Havoc Framework☆7,746Updated last month
- a drop-in replacement for Nmap powered by shodan.io☆3,087Updated 3 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,519Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,839Updated last year
- Fake Windows logon screen to steal passwords☆1,359Updated 5 years ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,133Updated 9 months ago
- Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victi…☆1,607Updated 9 months ago
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆802Updated last year
- 🐧 Abuse of Google Colab for cracking hashes.☆952Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,203Updated 7 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,369Updated 5 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,583Updated 5 months ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆1,004Updated last year
- A list of useful Powershell scripts with 100% AV bypass (At the time of publication).☆1,166Updated 6 months ago
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,678Updated 3 weeks ago