BANSHEE

Pure Python Browser Exploitation Framework
The last thing they hear before it's over. Hook. Steal. Pivot. Persist.
8
Modules
986
Tests
5
Hook Types
3
Obfuscation Levels
pip install red-specter-banshee
Docs
JS HOOK INJECTION | SESSION THEFT | KEYSTROKE CAPTURE | BROWSER FINGERPRINTING | DOM MANIPULATION | BROWSER-AS-PROXY | SERVICE WORKER PERSISTENCE | ANTI-FORENSICS | CSP BYPASS | FORM HIJACKING | WEBRTC IP LEAK JS HOOK INJECTION | SESSION THEFT | KEYSTROKE CAPTURE | BROWSER FINGERPRINTING | DOM MANIPULATION | BROWSER-AS-PROXY | SERVICE WORKER PERSISTENCE | ANTI-FORENSICS | CSP BYPASS | FORM HIJACKING | WEBRTC IP LEAK

The Browser Is the New Perimeter. Nobody Tests It.

Every organisation defends the network. Nobody defends the browser. BANSHEE turns the browser into an attack platform. Hook injection, session theft, keystroke capture, internal network pivoting — all from a single JavaScript payload delivered through a link.

Undefended Client

Firewalls protect the network. EDR protects the endpoint. Nothing protects the browser session. Cookies, tokens, localStorage, IndexedDB — all accessible to a single line of JavaScript. The richest target in the enterprise is completely unguarded.

Trusted Execution

The browser runs JavaScript from every origin it visits. Injected code executes with the user's full session context. Same cookies. Same tokens. Same permissions. The browser doesn't distinguish between legitimate and malicious JavaScript.

Internal Pivot Point

The browser sits inside the corporate network. It can reach internal services that external scanners can't. Browser-as-proxy turns a hooked browser into a SOCKS proxy into the internal network. One click. Full internal access.

Invisible Persistence

Service Workers survive page reloads. Cache poisoning persists across sessions. The hook outlives the visit. Close the tab, close the browser, come back tomorrow — the hook is still running. No files on disk. No process to kill.

The BANSHEE Arsenal

Eight modules. Each one built from scratch in pure Python. Every hook engine, every C2 channel, every evasion technique written natively. 986 tests. 5 hook types. 3 obfuscation levels. The browser becomes your attack platform.

Module 01

HOOK

5 Hook Types • 3 Obfuscation Levels

JavaScript hook injection with encrypted C2 communication. 5 hook types: inline, external, event-based, mutation observer, and WebSocket. 3 obfuscation levels for evasion. Hooks persist through navigation.

Module 02

SESSION

Cookie & Token Extraction

Cookie theft, session token extraction, session cloning for account takeover. localStorage and IndexedDB extraction. Captures every stored credential and session state in the browser.

Module 03

KEYLOG

Targeted Capture

Keystroke capture with intelligent targeting. Password field detection, credit card number recognition, form interception. Only captures what matters. Exfiltrates via encrypted C2 channel.

Module 04

RECON

Browser & Network Intelligence

Browser fingerprinting with canvas, WebGL, and audio context. WebRTC IP leak for real IP discovery behind VPN. Internal network discovery through the browser's network position.

Module 05

INJECT

DOM Manipulation Engine

DOM manipulation for fake login overlays, form hijacking, and phishing injection. Creates pixel-perfect credential harvesting pages that appear within the legitimate site. The user never leaves the domain.

Module 06

PIVOT

Browser-as-Proxy

Turns the hooked browser into a proxy into the internal network. Internal network scanning through the browser. CORS bypass for cross-origin data extraction. One hook becomes full internal access.

Module 07

PERSIST

Survival Mechanisms

Service Worker registration for persistent hooks that survive page reloads and browser restarts. Cache poisoning for long-term persistence. Bookmark injection for re-engagement. The hook outlives the visit.

Module 08

EVADE

Anti-Detection Suite

Anti-forensics, DevTools detection, sandbox detection, CSP bypass techniques. Detects when the operator opens developer tools and cleans up. Bypasses Content Security Policies to enable injection.

One Hook. Complete Browser Compromise.

Start the listener, deliver the hook, own the browser:

$ banshee listen --port 8443 --tls
[LISTEN] C2 server started on 0.0.0.0:8443 (TLS)
[HOOK] Hook payload generated — hook.js (2.3KB obfuscated)

[CONNECTED] Browser hooked — Chrome 122 / Windows 11
  Session: sid_7f3a9b2c | IP: 192.168.1.47

[SESSION] Extracting session data...
  12 cookies captured3 session tokens, 2 auth cookies
  localStorage: 847 entriesAPI keys, JWT tokens detected
[KEYLOG] Keystroke capture active...
  Password field detected on /login
[RECON] Browser fingerprinting...
  WebRTC leak: 10.0.0.47 (internal) — VPN bypass confirmed
[PIVOT] Internal network scan via browser...
  3 internal services discoveredJenkins, GitLab, Jira
[PERSIST] Service Worker registered...
  Hook persists across page reloads

ENGAGEMENT ACTIVE | 1 browser hooked | 14 credentials captured | 3 internal services mapped

Encrypted C2

All hook-to-server communication is encrypted over TLS. WebSocket channels with custom encoding. Traffic blends with normal HTTPS. No plaintext exfiltration.

The Triple

SPECTER SOCIAL delivers the link. BANSHEE hooks the browser. SCREAMER corrupts the operator's display. The operator is blind while the browser is owned.

Internal Discovery

The browser sits inside the network. BANSHEE uses it to scan internal services, extract internal IPs via WebRTC, and bypass CORS restrictions. One hook becomes internal access.

NEMESIS Integration

Browser-extracted credentials and internal network maps feed directly into NEMESIS. The Supreme Commander chains browser exploitation into full infrastructure compromise.

8
Modules
986
Tests
5
Hook Types
3
Obfuscation Levels
Unleashed Mode

Standard Mode Demonstrates. UNLEASHED Mode Executes.

Standard mode demonstrates capability and reports attack paths. UNLEASHED mode executes live hook injection, captures real credentials, and actively pivots through the browser. Ed25519 key gate required. Two flags must be passed. This is not accidental.

Capability Standard Unleashed
Hook injection Demonstrate payload delivery Live JS injection, encrypted C2
Session theft Report accessible cookies/tokens Extract and exfiltrate credentials
Keylogging Detect capturable fields Live keystroke capture and exfil
DOM injection Report injectable contexts Live overlay injection, form hijack
Network pivoting Report internal reach Active internal scanning via browser
Persistence Report persistence vectors Register Service Workers, poison cache
Evasion Report CSP gaps Active CSP bypass, anti-forensics

Ed25519 Gate

UNLEASHED mode requires an Ed25519 private key at ~/.redspecter/override_private.pem and the --override --confirm-destroy flags. Without both, BANSHEE operates in demonstration mode — showing what's possible without executing live attacks. The gate is cryptographic. There is no bypass. One key. One operator. Founder's machine only.

Social Delivers. BANSHEE Hooks. SCREAMER Blinds.

BANSHEE doesn't work alone. SPECTER SOCIAL crafts and delivers the link. BANSHEE hooks the browser the moment they click. SCREAMER corrupts the operator's monitoring display. Three tools. One kill chain. The operator is blind while the browser is owned.

SPECTER SOCIAL Delivers

Stage 1 — Social Engineering

SPECTER SOCIAL crafts the perfect phishing message and delivers the hook URL. Targeted to the individual. Timed to the moment. The click is inevitable.

BANSHEE Hooks the Browser

Stage 2 — Browser Exploitation

One click. The hook fires. Session tokens extracted. Keylogger active. Internal network discovered. The browser is now an attack platform inside the corporate network.

SCREAMER Blinds the Operator

Stage 3 — Operator Disruption

SCREAMER corrupts the monitoring dashboard. Alerts suppressed. Logs manipulated. The security team sees green while BANSHEE extracts everything through the hooked browser.

NEMESIS Orchestrates

Stage 4 — Full Chain

NEMESIS chains browser-extracted credentials into infrastructure compromise. Internal services discovered by BANSHEE become WRAITH scan targets. One click to full compromise.

Pure Engineering
Zero Dependencies. Pure Python C2.

Most browser exploitation frameworks require Ruby, Java, or Node.js runtimes. BANSHEE is pure Python. The C2 server, the hook generator, the payload encoder, the persistence engine — all Python. One language. One runtime. Zero dependencies that can break, conflict, or expose you.

8
Modules
5
Hook Types
986
Tests
3
Obfuscation Levels

Eighteen Tools. Every Layer. No Gaps.

BANSHEE is Tool 18 in the Red Specter offensive pipeline. It owns the browser — the one attack surface that sits inside every corporate network, behind every firewall, with access to every internal service the user can reach.

Tool 1 — LLM
FORGE
Test the model
Tool 2 — Agent
ARSENAL
Test the AI agent
Tool 3 — Swarm
PHANTOM
Coordinated agent assault
Tool 4 — Web
POLTERGEIST
Test the web layer
Tool 5 — Traffic
GLASS
Watch the wire
Tool 6 — Adversarial
NEMESIS
Think like the attacker
Tool 7 — Human
SPECTER SOCIAL
Target the human
Tool 8 — OS/Kernel
PHANTOM KILL
Own the foundation
Tool 9 — Physical
GOLEM
Attack the physical layer
Tool 10 — Supply Chain
HYDRA
Attack the trust chain
Tool 11 — Operator
SCREAMER
Blind the operator
Tool 12 — Infrastructure
WRAITH
The ghost in the wire
Tool 13 — Exploitation
REAPER
Deliver the payload
Tool 14 — Credentials
GHOUL
Crack the credentials
Tool 15 — Wireless
SPECTRE
Own the airwaves
Tool 16 — Active Directory
DOMINION
Own the domain
Tool 17 — OSINT
SHADOWMAP
See everything first
Tool 18 — Browser
BANSHEE
Own the browser
Discovery & Governance
IDRIS
Discovery & governance
Defence Layer
AI SHIELD
Defend everything above
SIEM Integration
redspecter-siem
Enterprise SIEM correlation

Security Distros & Package Managers

Kali Linux
.deb package
Parrot OS
.deb package
BlackArch
PKGBUILD
PyPI
pip install
Docker
docker-compose

The Browser Is Your Attack Surface. Own It.

BANSHEE turns every browser into an attack platform. Hook injection, session theft, internal pivoting, persistent access. Pure Python. The last thing they hear before it's over.