byob
Post-exploitation tool framework
An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence.
An open-source post-exploitation framework for students, researchers and developers.
9k stars
323 watching
2k forks
Language: Python
last commit: 28 days ago encrypted-connectionsno-dependenciesplatform-independentpost-exploitationreverse-shells
Related projects:
Repository | Description | Stars |
---|---|---|
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,196 |
alexandreborges/malwoverview | An automated tool for threat hunting and malware analysis | 2,967 |
lordnoteworthy/al-khaser | A Proof-of-Concept malware application designed to test anti-malware and sandbox systems. | 5,919 |
markcyber/badusb | A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 44 |
vxunderground/malwaresourcecode | A collection of malware source code from various platforms and programming languages. | 15,853 |
segment-boneyard/nightmare | A high-level browser automation library that allows users to interact with web pages in a synchronous manner. | 19,548 |
xmendez/wfuzz | A tool to automatically generate and test web application inputs for security vulnerabilities | 5,967 |
pwntester/ysoserial.net | Generates payloads to exploit unsafe .NET object deserialization. | 3,237 |
opennhp/opennhp | A Zero Trust networking protocol to hide servers and data from attackers by utilizing cryptography at the OSI 5th layer. | 13,513 |
outflanknl/evilclippy | An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,130 |
epinna/weevely3 | A web-based tool for post-exploitation purposes that provides a shell and various administrative tools to interact with compromised systems remotely. | 3,200 |
weisong-ucr/mab-malware | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 40 |
marten4n6/evilosx | A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities. | 2,270 |
bc-security/empire | A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks. | 4,258 |
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |