☆295Apr 16, 2022Updated 4 years ago
Alternatives and similar repositories for BITB-framwork
Users that are interested in BITB-framwork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,138Dec 9, 2025Updated 4 months ago
- This is a framework for web penetration testers and web developers☆12Apr 15, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆18Oct 10, 2025Updated 6 months ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- steal chrome saved passwords "undetectable"☆50Mar 15, 2022Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆373Dec 24, 2021Updated 4 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆60Feb 17, 2022Updated 4 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆607Mar 19, 2022Updated 4 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 4 years ago
- OSINT Framework : A python based Open Source Intelligence CLI framework similar to Metasploit.☆193Feb 7, 2026Updated 2 months ago
- ☆12Apr 20, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- A new approach to Browser In The Browser (BITB) without the use of iframes, allowing the bypass of traditional framebusters implemented b…☆442May 29, 2024Updated last year
- A python based tool for finding SQL vulnerable sites.☆14May 22, 2023Updated 2 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Stop Windows Defender using the Win32 API☆193Feb 2, 2022Updated 4 years ago
- ☆10Apr 2, 2022Updated 4 years ago
- My Notes about Penetration Testing☆734Jan 17, 2026Updated 3 months ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Numbers in Your Documents can reveal your personal informations. This tool is an OSINT tool to gather informations from CC, BIN code, MIC…☆13Jan 31, 2021Updated 5 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- find any page admin and cpanel☆11Jul 29, 2017Updated 8 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago