A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
☆36Aug 12, 2023Updated 2 years ago
Alternatives and similar repositories for bifrost
Users that are interested in bifrost are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It's what all the kids are talking about☆12Apr 25, 2023Updated 3 years ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Windows NTLM Authentication Backdoor☆18Jan 27, 2022Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆23Jan 6, 2026Updated 3 months ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and …☆22Mar 26, 2026Updated last month
- LD_PRELOAD rootkit☆140Feb 29, 2024Updated 2 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- An implementation of execve() in user space☆35Oct 25, 2024Updated last year
- Bulk delete Tweets you have liked on Twitter!☆13Aug 14, 2023Updated 2 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of Reverse, Bind & Web Shells☆15Mar 25, 2026Updated last month
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆88Sep 16, 2025Updated 7 months ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- ☆14Dec 27, 2019Updated 6 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- In line function hooking LKM rootkit☆54Mar 5, 2020Updated 6 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 10 months ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DLL Injector as a service that watches the health of the started thread.☆11Feb 3, 2020Updated 6 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆19Jul 1, 2023Updated 2 years ago
- Golang Command & Control Server For Managing And Remote Accessing Machines Via Web Interface☆13Apr 13, 2023Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 4 months ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 4 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Oct 5, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- A minimal malware analysis sandbox for macOS☆34Feb 15, 2023Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Apr 17, 2022Updated 4 years ago
- RRG Android App for use with Proxmark3 RDV4 and the blueshark addon☆12Sep 16, 2019Updated 6 years ago
- A companion Github repo for the book - Threat Hunting macOS by Jaron Bradley☆20Jul 26, 2025Updated 9 months ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Playing with LLVM passes☆40Aug 17, 2023Updated 2 years ago