byob
Post-exploitation tool framework
An open-source framework for creating custom post-exploitation tools with automated payload generation and platform independence.
An open-source post-exploitation framework for students, researchers and developers.
9k stars
324 watching
2k forks
Language: Python
last commit: 3 months ago encrypted-connectionsno-dependenciesplatform-independentpost-exploitationreverse-shells
Related projects:
Repository | Description | Stars |
---|---|---|
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,204 |
alexandreborges/malwoverview | A tool for analyzing malware and threat intelligence data from multiple sources | 3,012 |
markcyber/badusb | A collection of educational scripts and payloads for simulating vulnerabilities and malware attacks on Windows systems using custom hardware. | 60 |
vxunderground/malwaresourcecode | A collection of malware source code from various platforms and programming languages. | 16,182 |
segment-boneyard/nightmare | A high-level browser automation library that allows users to interact with web pages in a synchronous manner. | 19,555 |
xmendez/wfuzz | A tool to automatically generate and test web application inputs for security vulnerabilities | 5,978 |
pwntester/ysoserial.net | Generates payloads to exploit unsafe .NET object deserialization. | 3,260 |
opennhp/opennhp | A Zero Trust protocol that leverages resource-hiding and encryption to safeguard servers and data from attackers | 13,520 |
outflanknl/evilclippy | An assistant tool designed to create malicious MS Office documents by hiding or tampering with VBA macros and macro analysis tools | 2,131 |
epinna/weevely3 | A web-based tool for post-exploitation purposes that provides a shell and various administrative tools to interact with compromised systems remotely. | 3,216 |
weisong-ucr/mab-malware | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
marten4n6/evilosx | A remote administration tool for macOS designed to provide backdoor access and post-exploitation capabilities. | 2,286 |
bc-security/empire | A post-exploitation and adversary emulation framework used to aid Red Teams and Penetration Testers in testing and simulating complex attacks. | 4,297 |
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 528 |