stormshadow07 / BeeF-Over-WanLinks
Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
☆164Updated last year
Alternatives and similar repositories for BeeF-Over-Wan
Users that are interested in BeeF-Over-Wan are comparing it to the libraries listed below
Sorting:
- Multiplatform payload dropper☆280Updated 4 years ago
- A simple script to generate a hidden url for social engineering.☆122Updated 5 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆209Updated 7 years ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆162Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆398Updated last year
- Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attac…☆90Updated 6 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆358Updated 8 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆284Updated 5 years ago
- A Phishing Dropper designed to Pentest.☆275Updated 8 years ago
- Userspace remote keylogger for Linux, works with X, logs key stikes to a file and sends report by email.☆146Updated last year
- Python Remote Access Trojan☆143Updated 5 years ago
- Control remote computers using discord bot and python 3.☆183Updated 3 years ago
- ☆178Updated 2 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- SQLi Google Dork Scanner☆59Updated 4 years ago
- Adds ability to successfully login into websites that have a delay after login and adds directory of chromedriver, this fork was used in …☆156Updated 3 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆141Updated 5 years ago
- Git all your favorite tools in one click☆269Updated 3 years ago
- Let's find someone's account☆166Updated 6 years ago
- Blue Eye is a python Recon Toolkit script. It shows ports and headers. Subdomain resolves to the IP addresses, company email addresses an…☆176Updated last week
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆293Updated 7 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- ☆35Updated 6 years ago
- Inject malicious code into *.debs☆279Updated 3 years ago
- Gloom-Framework :: Linux Penetration Testing Framework☆52Updated 8 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆242Updated 4 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆110Updated 7 years ago
- SMS Phishing Tools☆79Updated 8 years ago
- Easy way to brute-force web directory.☆160Updated 6 years ago
- XSHOCK Shellshock Exploit☆87Updated 3 years ago