tklab-tud / BSFLinks
Botnet Simulation Framework
☆77Updated 5 years ago
Alternatives and similar repositories for BSF
Users that are interested in BSF are comparing it to the libraries listed below
Sorting:
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 4 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- ☆50Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Updated 7 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Ransomware Decryptors☆36Updated 3 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Automate Metasploit scanning and exploitation☆115Updated 2 weeks ago
- ☆53Updated 4 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Automated 802.1x Bypass☆85Updated 5 years ago
- ☆43Updated 6 years ago
- A rogue DNS detector☆23Updated last year
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- Slack C2bot that executes commands and returns the output.☆46Updated 2 years ago