Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
β22May 15, 2022Updated 3 years ago
Alternatives and similar repositories for Coyote
Users that are interested in Coyote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π Python Exploit for CVE-2022-23935β11Feb 10, 2023Updated 3 years ago
- β12Sep 22, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 3 years ago
- β10Apr 2, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- backdoor that uses dns to communicateβ35Aug 9, 2025Updated 8 months ago
- Another vulnerability scannerβ18Aug 9, 2025Updated 8 months ago
- An exotic service bruteforce tool.β13Apr 12, 2025Updated last year
- Perform OSINT on external targets using Shodanβ23Feb 7, 2024Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord APIβ49Aug 18, 2021Updated 4 years ago
- A wacky exploitation framework written in pure python3.β22Mar 24, 2024Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β11Apr 16, 2022Updated 4 years ago
- HTTP based framework for building command and control components for remote access trojansβ15Aug 2, 2021Updated 4 years ago
- Evasion kit for Cobalt Strikeβ30Jan 16, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Confluence Hardcoded Password POCβ15Jul 30, 2022Updated 3 years ago
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Apr 28, 2022Updated 3 years ago
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and β¦β22Mar 26, 2026Updated 3 weeks ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β19Jul 1, 2023Updated 2 years ago
- Web-based GUI for TorBoxβ19Jun 13, 2023Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).β54Aug 29, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Dockerβ32Apr 5, 2022Updated 4 years ago
- POC exploit for CVE-2015-10141β30Aug 11, 2025Updated 8 months ago
- The long shadow to emerge as other Git repositoriesβ18Feb 25, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Useful Alfred Snippets for Pentestβ18Dec 5, 2024Updated last year
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeoverβ16Jul 5, 2022Updated 3 years ago
- β20Nov 1, 2022Updated 3 years ago
- spring4shell | CVE-2022-22965β23Jun 30, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat oβ¦β22Jan 6, 2026Updated 3 months ago
- AWS Security Toolβ29Jan 1, 2024Updated 2 years ago
- Central IoC scanner based on Lokiβ20Nov 12, 2021Updated 4 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedβ¦β18Mar 25, 2022Updated 4 years ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22May 14, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2022-0847 POCβ15Mar 14, 2022Updated 4 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.β17Jun 18, 2025Updated 9 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β22Apr 19, 2022Updated 3 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 3 years ago
- PHP lab to test captcha bypassingβ30Jan 8, 2024Updated 2 years ago
- Generate Proxy DLLs in Rustβ50Mar 2, 2026Updated last month
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.β18Jan 22, 2025Updated last year