swagkarna / BITB-framworkLinks
☆14Updated 3 years ago
Alternatives and similar repositories for BITB-framwork
Users that are interested in BITB-framwork are comparing it to the libraries listed below
Sorting:
- Dogma V1.5.3☆29Updated 5 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Remote persistent keylogger for Windows and Linux..☆12Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Cracking protocols FTP and SSH.☆12Updated 10 months ago
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- ☆13Updated 2 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆22Updated last year
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- ☆13Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆19Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- Fake Update Website ( On Click Automatic Download Windows Payload )☆11Updated 5 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 4 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Simple python script that attacks phishing sites database with fake random generated usernames and passwords to flood their databases wit…☆10Updated 4 years ago
- This is power full BotNet☆41Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 10 months ago
- An open-source .NET Ransomware☆27Updated 3 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24Updated 3 years ago