☆295Apr 16, 2022Updated 3 years ago
Alternatives and similar repositories for BITB-framwork
Users that are interested in BITB-framwork are comparing it to the libraries listed below
Sorting:
- this is the youtube phishing html, use it to grab anyones google account info ! Link : https://pinkythegawd.github.io/youtube-phishing-pa…☆18Oct 10, 2025Updated 5 months ago
- ☆10Mar 29, 2022Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Artificial Neural Network Library Using Typescript☆24Oct 20, 2025Updated 4 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,112Dec 9, 2025Updated 3 months ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 3 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- ☆31Aug 24, 2022Updated 3 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Mar 24, 2023Updated 2 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆60Feb 17, 2022Updated 4 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆504Mar 11, 2024Updated 2 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Aug 4, 2023Updated 2 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Mar 5, 2026Updated last week
- Creation and removal of Defender path exclusions and exceptions in C#.☆32Nov 1, 2023Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆762Jul 6, 2021Updated 4 years ago
- Active Directory certificate abuse.☆38Feb 9, 2022Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆48Jan 22, 2025Updated last year
- Generate Professional Phishing Emails Fast And Easy☆1,370May 1, 2025Updated 10 months ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Stop Windows Defender using the Win32 API☆192Feb 2, 2022Updated 4 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆626May 2, 2025Updated 10 months ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- Sebuah implementasi smart contract untuk meng-arsipkan segala drama di sosmed :p☆23May 12, 2025Updated 10 months ago
- Collection of offensive tools targeting Microsoft Azure☆219Jan 18, 2023Updated 3 years ago
- A container to host website on Tor hidden service with .onion address.☆20Oct 9, 2021Updated 4 years ago
- ☆21Dec 1, 2021Updated 4 years ago