Botnet Simulation Framework
β78Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for BSF
Users that are interested in BSF are comparing it to the libraries listed below
Sorting:
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Dec 6, 2020Updated 5 years ago
- π Instagram Info Scraperβ14Mar 3, 2021Updated 4 years ago
- β17Jan 2, 2020Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reβ¦β18Jun 30, 2020Updated 5 years ago
- AliGuard PHP WAFβ12Feb 16, 2024Updated 2 years ago
- SubDomain Finderβ13Nov 9, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NETβ13May 10, 2020Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instancesβ27Mar 14, 2021Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaβ¦β16Dec 8, 2025Updated 2 months ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitationβ16Sep 8, 2025Updated 5 months ago
- Gmail shell, for hackers execute commands via gmailβ19Feb 3, 2021Updated 5 years ago
- DNS Enumeration with Asynchronicityβ45Oct 30, 2018Updated 7 years ago
- Flexible Penetrate Testing Auxiliary Suiteβ73Jun 19, 2023Updated 2 years ago
- Simple RAT in C#β27Apr 11, 2020Updated 5 years ago
- RainbowSQL is very fast dork&SQL injection scanner.β61Jun 12, 2025Updated 8 months ago
- Simple but sharp ransomwareβ35Jul 11, 2020Updated 5 years ago
- Interactive Post Exploitation Toolβ37Oct 1, 2019Updated 6 years ago
- Docker image for hackingβ21Feb 10, 2025Updated last year
- Capture, upload and analyze network traffic; powered by PacketTotal.com.β97Mar 12, 2020Updated 5 years ago
- Wi-Fi Exploit Toolβ50May 23, 2020Updated 5 years ago
- Espia trafico de la red NETSPY.sh ( hackingyseguridad.com )β23Apr 27, 2025Updated 10 months ago
- Python Remote Administration Tool With GUIβ18Jun 6, 2023Updated 2 years ago
- Cross-Site Scripting (XSS) vulnerability analyzerβ21Feb 13, 2026Updated 2 weeks ago
- Web-based check for Windows privesc vulnerabilitiesβ140May 14, 2023Updated 2 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).β42Nov 18, 2019Updated 6 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "reaβ¦β22Apr 22, 2024Updated last year
- PEDA - Python Exploit Development Assistance for GDBβ23Aug 6, 2025Updated 6 months ago
- Tool useful to discover services behind unknown portsβ14May 20, 2021Updated 4 years ago
- Scanning in the middlelayer, v2β10Feb 18, 2026Updated last week
- A collection of tools for managing and automating vulnerability management.β13Mar 24, 2022Updated 3 years ago
- π₯ Pentest Cheat Sheetβ36Aug 10, 2021Updated 4 years ago
- YARA rule-based automation system to detect network attacks at byte-levelβ13May 12, 2021Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely usingβ¦β120Aug 11, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- Usage of WH-HackerExploit Hacking - v2 Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibβ¦β64May 2, 2020Updated 5 years ago
- β46Mar 20, 2021Updated 4 years ago
- Android Hacking Framework to generate apk with backdoor, Works on both WAN and LANβ19Jun 19, 2022Updated 3 years ago
- A proof-of-concept Node.js ransomwareβ21Mar 27, 2022Updated 3 years ago
- Penetration testing utility and antivirus assessment tool.β315Apr 25, 2023Updated 2 years ago