byob
Post-exploitation tool framework
An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence.
An open-source post-exploitation framework for students, researchers and developers.
9k stars
324 watching
2k forks
Language: Python
last commit: 4 months ago encrypted-connectionsno-dependenciesplatform-independentpost-exploitationreverse-shells
Related projects:
Repository | Description | Stars |
---|---|---|
| An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,204 |
| A tool for analyzing malware and threat intelligence data from multiple sources | 3,012 |
| A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 |
| A collection of malware source code from various platforms and programming languages. | 16,182 |
| A high-level browser automation library that allows users to interact with web pages in a synchronous manner. | 19,555 |
| A tool to automatically generate and test web application inputs for security vulnerabilities | 5,978 |
| Generates payloads to exploit unsafe .NET object deserialization. | 3,260 |
| A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
| An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,131 |
| A web-based tool for post-exploitation purposes that provides a shell and various administrative tools to interact with compromised systems remotely. | 3,216 |
| An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
| A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities. | 2,286 |
| A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks. | 4,297 |
| Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 528 |