IncSTK / rathole
RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional libraries. It features blowfish encryption, process name hiding and definition of a prefered shell.
☆37Updated 11 years ago
Related projects: ⓘ
- Stækka Metasploit - Extenting Metasploit☆53Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- ☆23Updated this week
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆76Updated 7 years ago
- Projects and POCs☆58Updated 10 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆48Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 7 years ago
- ☆47Updated 8 years ago
- Multithreaded DNS recursive host brute-force tool☆12Updated 9 years ago
- Multi-threaded SSH Password Auditor☆92Updated 10 years ago
- ☆33Updated 8 years ago
- ~ BannerGrab☆26Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- misc pentest tools.☆26Updated 9 years ago
- ssh session type for metasploit☆97Updated last year
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 3 years ago
- Converts a command to a base64 powershell compatible string☆24Updated 10 years ago
- EternalBlue/DoublePulsar python wrapper☆10Updated 6 years ago
- ☆18Updated this week
- ☆20Updated 8 months ago
- MacroSploit is a modified version of unicorn used to generate a social engineering Microsoft Office macro payload for penetration testers…☆8Updated 9 years ago
- Deploy payloads to *Nix systems en masse☆104Updated 4 years ago
- ☆38Updated this week
- scripts used in my pentest work.☆44Updated 8 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 7 years ago
- Wraps sudo; transparently steals user's credentials and exfiltrate over DNS. For those annoying times when you get a shell/file write on …☆35Updated 7 years ago