Hack the Browser.Harden the System.

BeEF empowers penetration testers to exploit browsers safely and reveal client-side weaknesses hidden behind the network perimeter.

What is BeEF?

BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.

Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side attack vectors. Unlike other security frameworks, BeEF looks past the hardened network perimeter and client system, and examines exploitability within the context of the one open door: the web browser.

BeEF will hook one or more web browsers and use them as beachheads for launching directed command modules and further attacks against the system from within the browser context.

Key Capabilities

Browser-Focused Security

Targets the most vulnerable entry point: web browsers.

Client-Side Attack Vectors

Exploits weaknesses within the browser context.

Cross-Platform Testing

Works across all major browsers and operating systems.

Powerful Features

Everything you need for browser exploitation and client-side penetration testing

Web-Based Control Panel

Powerful and intuitive administrative interface for managing hooked browsers and launching targeted command modules

  • Real-time browser hooks
  • Module execution interface
  • Session management
Getting StartedLogsCommands
Hooked Browsers
📁 Online Browsers
🦊 10.211.55.10
🌐 10.211.55.2
📁 Offline Browsers
IDTypeEvent
9CommandHooked
8CommandHooked
7Zombie10.211

Command Modules

Extensive library of browser-based command modules with simple and powerful API for targeted attacks

  • Information gathering
  • Social engineering attacks
  • Browser exploitation
Command ModulesExtensionsAutorun Rules
Search modules...
Categories
Information Gathering42
Social Engineering28
Browser Exploitation35
Persistence18
Geolocation12
Detection22
Get Cookies
low
Retrieve all cookies from the hooked browser
Get System Info
low
Gather detailed system and browser information

Network Discovery

Bypass network perimeter defenses by using hooked browsers as beachheads for internal reconnaissance

  • Internal network mapping
  • WebRTC extensions
  • Pivot capabilities
Network DiscoveryPort ScanningWebRTC
Discovery Complete
Discovered Network Hosts
Network Scanner Console

Extensible Framework

Modular architecture with autorun rule engine and development API for creating custom modules

  • Module development API
  • Extension system
  • Event-driven architecture
Module EditorAPI DocsExtensions
BeEF Framework
modules
social_engineering
fake_notification.rb
redirect_browser.rb
clickjacking.rb
browser
extensions
core
modules / social_engineering / fake_notification.rb
Ruby
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
"comment">#
"comment"># Copyright (c) 2006-2023 Wade Alcorn - wade@bindshell.net
"comment"># Browser Exploitation Framework (BeEF) - https://beefproject.com
"comment">#
"keyword">class Fake_notification < BeEF::Core::Command
"keyword">def self.options
"keyword">return [
{ 'name' => 'notification_text',
'description' => 'Text to display in fake notification',
'ui_label' => 'Notification Text',
'value' => 'Your session has expired. Please log in again.',
'width' => '400px'
},
{ 'name' => 'notification_type',
'description' => 'Type of notification to display',
'ui_label' => 'Notification Type',
'value' => 'security',
'type' => 'combobox',
'store' => ['security', 'update', 'error', 'info']
},
{ 'name' => 'auto_close',
'description' => 'Auto-close notification after delay',
'ui_label' => 'Auto Close',
'value' => 'true',
'type' => 'checkbox'
}
]
"keyword">end
"keyword">def post_soft_load
"keyword">return
"keyword">end
"keyword">def pre_s"keyword">end
BeEF::Core::NetworkStack::Handlers::AssetHandler.instance.bind(
'/#{@command_id}/notification.js',
'/modules/social_engineering/fake_notification',
'notification.js'
)
"keyword">end
"keyword">def callback
content = {}
content['result'] = @datastore['result'] "keyword">if @datastore['result']
content['clicked'] = @datastore['clicked'] "keyword">if @datastore['clicked']
save content
"keyword">end
"keyword">end

Advance Browser Security Research

Join security professionals worldwide contributing to BeEF's mission of improving web browser security through collaborative research and development.

Ways to Contribute

Multiple paths to make an impact in browser security research

Code Contributions

Develop new command modules, improve core framework functionality, and fix bugs to advance browser security research.

  • Command modules
  • Core improvements
  • Bug fixes & optimization
  • Testing & QA

Security Research

Develop new browser exploitation modules and extend BeEF capabilities with innovative attack vectors and techniques.

  • Browser exploit modules
  • Attack vector research
  • Persistence techniques
  • Social engineering modules

Community Support

Help fellow security researchers by answering questions, providing guidance, and sharing expertise.

  • Discord community help
  • Mentoring newcomers
  • Knowledge sharing
  • Best practices

Getting Started

Your journey from newcomer to contributor in four steps

1

Setup Development Environment

Install Ruby 3.0+, Node.js, and clone the BeEF repository

  • Install Ruby 3.0+ and Node.js
  • Clone BeEF repository from GitHub
  • Run ./install script
2

Explore the Codebase

Understand the architecture and module structure

  • Review project architecture
  • Study existing modules
  • Read documentation
3

Find Your First Issue

Look for beginner-friendly issues and documentation improvements

  • Browse "good first issue" labels
  • Check documentation gaps
  • Join Discord for guidance
4

Submit Your Contribution

Create a pull request and engage with the community

  • Follow PR guidelines
  • Write clear commit messages
  • Engage in code review

Community Hub

Connect with security researchers and stay updated on project activity

Community Statistics

Loading stats...

Community Guidelines

  • Follow responsible disclosure practices
  • Respect all community members
  • Focus on defensive security research
  • Provide clear documentation
  • Test your contributions thoroughly

Recent Activity

Loading activity...

Ready to Contribute?

Start with a small contribution and become part of our security research community