Pinned Repositories
BlackMarlinExec
Seven Degrees of Domain Admin
BloodHoundAD
Six Degrees of Domain Admin
CarpaAlko
⛓️💥 Notorious Smartphones Malware, for Remote Administration Which include Advanced Spyware functions. Penetrate iOS and Android, their Sandbox and SSL Security.
CrackHoundAD
Data and exploit collector for BloodHoundAD. Automatically determine what Domain or Directory the current user belongs to. (BOF.NET)
EXECTRINITY
Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.
PasswordCracker
Perform a (Fantastic) Force Attacks, Incorporating 𝗧𝗲𝗲𝘁𝗵 Cybertooth && 𝗝𝗼𝗵𝗻 the Ripper. Fastest and most Advanced Password and Logon Cracker.
Teeth
Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many operating systems, calculate and brute - forcing using CPUs, GPUs, and even some FPGAs.
TheFatRat_v2
TFRv2 : Remote control Access and exploiting tool, used as a Deadly Backdoor (Generator) that bypass most Anti-Virus software. Penetrate a strong system such as Windows, MacOS, and Android.
WannaCry2.0
𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".
ghidra
Ghidra is a software reverse engineering (SRE) framework
byt3n33dl3's Repositories
byt3n33dl3/TheFatRat_v2
TFRv2 : Remote control Access and exploiting tool, used as a Deadly Backdoor (Generator) that bypass most Anti-Virus software. Penetrate a strong system such as Windows, MacOS, and Android.
byt3n33dl3/PasswordCracker
Perform a (Fantastic) Force Attacks, Incorporating 𝗧𝗲𝗲𝘁𝗵 Cybertooth && 𝗝𝗼𝗵𝗻 the Ripper. Fastest and most Advanced Password and Logon Cracker.
byt3n33dl3/Teeth
Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many operating systems, calculate and brute - forcing using CPUs, GPUs, and even some FPGAs.
byt3n33dl3/CracKerBlitz
Kerberos Attacks From Networks or Domain controller log Perspective. 𝗖𝗿𝗮𝗰𝗞𝗲𝗿𝗕𝗹𝗶𝘁𝘇 Involves the use of <rc4_hmac> in Kerberos exchanges.
byt3n33dl3/PyMalleasusC2
Pegasus, the Spyware that represents a significant Offensive Colonel.
byt3n33dl3/thc-Offshore
offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass several anti-virus software, penetrate a security system. Clear and realtime backdoor alert! results ( straightforward ). Payloads generator, trust attack
byt3n33dl3/.crackedauth
( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a weak credentials protocol would easily got compromised. Active services ( trust attack ), next generation of .crackedauth would be able to perform an attacks on Kerberos authentication.
byt3n33dl3/CorporalKraken
Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.
byt3n33dl3/NetVenom
P O I S O N I N G
byt3n33dl3/thc-Nikto
Advance web scanner, It's Designed to identify various Security vulnerabilities in web applications by scanning for misconfigurations, information disclosures, and more. Nikto provides a comprehensive options for customization and detailed documentation.
byt3n33dl3/thc-Cartel
Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.
byt3n33dl3/BrutalHookExec
Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attack Perform the best actions, more easy to hit, and easy to modify
byt3n33dl3/ExpertBosun
Encrypting directory and access. Execute the Commands Based on external inputs RCE.
byt3n33dl3/NeoExec
Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.
byt3n33dl3/Crawler_v2
Remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kernels.
byt3n33dl3/Grizzly
Trojan GUI && display panel
byt3n33dl3/Isabella
Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program will enables cyber attacks to gain access to and infiltrate data from machines without being detected.
byt3n33dl3/OffensiveYARA
𝗬𝗔𝗥𝗔 for offensive, YARA can do that!?
byt3n33dl3/OffensiveNim
Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?
byt3n33dl3/SERVICETRINITY
Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastructure in a flood of Internet traffic.
byt3n33dl3/Jester
Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guys
byt3n33dl3/CLFS
it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach
byt3n33dl3/CrackAVFee
it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach
byt3n33dl3/Kali
Kali Kernel source tree for Penetration Tester Distro.
byt3n33dl3/ChapelDirExec
Directory structure attacks
byt3n33dl3/CrackKeyIso
it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach
byt3n33dl3/DockerMacExec
More payloads for Trojan infections, a stup!d memory of Trojan spreads
byt3n33dl3/MLR
Malware research, studying mydoom
byt3n33dl3/Dracnmap_v2
Swiss army knife kit for Nmap
byt3n33dl3/facebook
Clone of Facebook