The Browser Exploitation Framework Project
JavaScript Ruby CSS HTML Assembly ActionScript Other
Failed to load latest commit information.
.github Update ISSUE_TEMPLATE.md May 13, 2016
arerules Add Text to Voice module May 14, 2016
core Had to publish the 3th bypass for Vegan anti-BeEF Chrome extension fr… Jul 4, 2016
doc Rename docs to doc Mar 20, 2016
extensions Add timeout to MSF RPC initial connection Jul 4, 2016
liveCD updated copyright year Dec 30, 2015
modules Remove BozoCrack module Jun 20, 2016
test Re-enable DNS unit tests Apr 22, 2016
tools updated copyright year Dec 29, 2015
.gitignore added extensions/admin_ui/media/javascript-min/ to .gitignore Sep 1, 2015
.ruby-gemset Added .ruby-gemset and .ruby-version for rvm Jul 6, 2015
.ruby-version Update Ruby version to 2.3.0 Apr 21, 2016
.travis.yml Add RVM 2.3.0 to .travis.yml Apr 29, 2016
Gemfile Add Text to Voice module May 14, 2016
Gemfile.lock Add Text to Voice module May 14, 2016
INSTALL.txt Update INSTALL.txt with Ubuntu instructions Mar 11, 2016
README Update issues URL Mar 26, 2016
README.mkd tiny change Mar 26, 2016
Rakefile Rename docs to doc Mar 20, 2016
VERSION updated copyright year Dec 29, 2015
beef Add WS timer to banner Feb 13, 2016
beef_cert.pem Added default key/cert files for HTTPS support, added a few notes abo… Aug 6, 2012
beef_key.pem Added default key/cert files for HTTPS support, added a few notes abo… Aug 6, 2012
config.yaml Remove console shell from config May 9, 2016
install Version check to ensure BeEF is running Ruby 2.0+ Jan 29, 2016
install-beef Use Ruby 2.1.5 Jan 29, 2016
update-beef updated copyright year Dec 29, 2015

README.mkd

Copyright (c) 2006-2016 Wade Alcorn - wade@bindshell.net
Browser Exploitation Framework (BeEF) - http://beefproject.com
See the file 'doc/COPYING' for copying permission

What is BeEF?

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser. BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.

Get Involved

You can get in touch with the BeEF team. Just check out the following:

Please, send us pull requests!

Web: http://beefproject.com/

Bugs: https://github.com/beefproject/beef/issues

Security Bugs: security@beefproject.com

IRC: ircs://irc.freenode.net/beefproject

Twitter: @beefproject

Requirements

Quick Start

The following is for the impatient.

For full installation details (including on Microsoft Windows), please refer to INSTALL.txt. We also have a Wiki page at https://github.com/beefproject/beef/wiki/Installation

   $ curl -L https://raw.githubusercontent.com/beefproject/beef/a6a7536e/install-beef | bash -s stable

Usage

To get started, simply execute beef and follow the instructions:

   $ ./beef

On windows use

  $ ruby beef