th3r4ven / Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
☆48Updated 3 years ago
Alternatives and similar repositories for Bifrost:
Users that are interested in Bifrost are comparing it to the libraries listed below
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 5 months ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆17Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆26Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- An ADB-based botnet written in C.☆44Updated 2 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 4 years ago
- Malware and malicious applications database☆38Updated 10 months ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 7 months ago
- ☆27Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated last month
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- An open-source .NET Ransomware☆24Updated 3 years ago
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆42Updated last year