Bifrost C2. Open-source post-exploitation using Discord API
☆48Aug 18, 2021Updated 4 years ago
Alternatives and similar repositories for Bifrost
Users that are interested in Bifrost are comparing it to the libraries listed below
Sorting:
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Apr 25, 2022Updated 3 years ago
- 🚀 Builder of Malware Loader☆13Nov 12, 2020Updated 5 years ago
- Linux startup analyzer☆66Jun 2, 2025Updated 9 months ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21May 15, 2022Updated 3 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- a programm to detect discord maleware☆10May 27, 2022Updated 3 years ago
- A Working Discord Selfbot 2022 🔥 Made By TheAxes☆12Oct 22, 2022Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- ☆11Sep 26, 2019Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆36May 27, 2024Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Wordlists generated over the years of penetration testing☆14Mar 18, 2025Updated 11 months ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- ☆12Mar 27, 2024Updated last year
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- PHP lab to test captcha bypassing☆30Jan 8, 2024Updated 2 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- Discord Hcaptcha Solver using question-answering solving method, powered by gpt-4☆65Jun 10, 2023Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- ☆15May 26, 2021Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Feb 2, 2022Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago