Botnet Simulation Framework
☆79Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for BSF
Users that are interested in BSF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated last month
- Gmail shell, for hackers execute commands via gmail☆20Feb 3, 2021Updated 5 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 10 months ago
- A productivity burp extension which reminds to take break while you are at work!☆18May 31, 2020Updated 5 years ago
- Simple RAT in C#☆26Apr 11, 2020Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- Alfred is a advanced OSINT information gathering tool☆12Nov 14, 2025Updated 5 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- ☆17Feb 29, 2020Updated 6 years ago
- Docker image for hacking☆21Feb 10, 2025Updated last year
- Web-based check for Windows privesc vulnerabilities☆139May 14, 2023Updated 2 years ago
- It's only hitting vulnerable path in termdd.sys!!! NOT DOS☆12May 19, 2019Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- ☆17Aug 13, 2020Updated 5 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A proof-of-concept Node.js ransomware☆20Mar 27, 2022Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 7 months ago
- ☆46Mar 20, 2021Updated 5 years ago
- ☆29May 19, 2023Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDB☆24Aug 6, 2025Updated 8 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆118Aug 11, 2020Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Aug 6, 2020Updated 5 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 7 years ago
- A forensic evidence acquirer☆86Apr 14, 2021Updated 5 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago