Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
GNU General Public License v3.0
153
stars
93
forks
source link
why does this happen with the regular ngrok links??? #80
I worked on figuring out solutions for so many hours to the point where i feel my brain breaking apart. I fixed all the errors from the ngrok config spacing and then I run the program and it works and then go to paste my link, paste it and this happens when i press enter:
Traceback (most recent call last):
File "BeeFOverWan.py", line 122, in
send_to=input(color((' [?] Enter Adress of Link [You are Sending to Victim]: ')))
File "", line 1
https://8e61-13-59-43-20.ngrok.io
I worked on figuring out solutions for so many hours to the point where i feel my brain breaking apart. I fixed all the errors from the ngrok config spacing and then I run the program and it works and then go to paste my link, paste it and this happens when i press enter:
Traceback (most recent call last): File "BeeFOverWan.py", line 122, in
send_to=input(color((' [?] Enter Adress of Link [You are Sending to Victim]: ')))
File "", line 1
https://8e61-13-59-43-20.ngrok.io