Newsletter
Join the Community
Subscribe to our newsletter for the latest news and updates
Provides browser window templates for Browser In The Browser (BITB) phishing attacks, enabling realistic simulations for social engineering engagements.

AI geolocation platform identifying indoor/outdoor photo locations like hotel rooms and street views with verifiable evidence for OSINT and recon.

Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.
The BITB project offers a collection of browser window templates designed for "Browser In The Browser" (BITB) phishing attacks. This technique creates a fake browser window within the legitimate browser, mimicking popular login pages to trick users into revealing credentials.
Key Features:
index.html files to set the page title, masqueraded domain name, domain path, and the actual phishing link embedded in an iFrame.fadeIn() function, enhancing realism.Use Cases:
Detection Methods Highlighted:
enhanced-iframe-protection) designed to detect and warn users about embedded iframes, which are central to BITB attacks.Disclaimer: The project explicitly states that usage for attacking targets without prior consent is illegal and emphasizes the end user's responsibility to obey all applicable laws.