Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
β22May 15, 2022Updated 3 years ago
Alternatives and similar repositories for Coyote
Users that are interested in Coyote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π Python Exploit for CVE-2022-23935β11Feb 10, 2023Updated 3 years ago
- β12Sep 22, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiterβ28Apr 17, 2022Updated 4 years ago
- β10Apr 2, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- backdoor that uses dns to communicateβ35Aug 9, 2025Updated 8 months ago
- Another vulnerability scannerβ18Aug 9, 2025Updated 8 months ago
- WIP Post-exploitation framework tailored for hypervisors.β50Nov 16, 2023Updated 2 years ago
- An exotic service bruteforce tool.β13Apr 12, 2025Updated last year
- Perform OSINT on external targets using Shodanβ24Feb 7, 2024Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord APIβ49Aug 18, 2021Updated 4 years ago
- A wacky exploitation framework written in pure python3.β23Mar 24, 2024Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β11Apr 16, 2022Updated 4 years ago
- HTTP based framework for building command and control components for remote access trojansβ15Aug 2, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Evasion kit for Cobalt Strikeβ30Jan 16, 2026Updated 3 months ago
- Confluence Hardcoded Password POCβ15Jul 30, 2022Updated 3 years ago
- πα΄ Κα΄Ι΄Ι’ Κα΄α΄ α΄Κsα΄ sΚα΄ΚΚπβ11Apr 28, 2022Updated 4 years ago
- β10Oct 18, 2024Updated last year
- A fast, powerful open-source password generator with hexagonal architecture. Features a zero-dependency core, Web UI demo, CLI tool, and β¦β23Mar 26, 2026Updated last month
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.β19Jul 1, 2023Updated 2 years ago
- A script for automatize boolean-based blind SQL injections (MVP).β54Aug 29, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Dockerβ32Apr 5, 2022Updated 4 years ago
- POC exploit for CVE-2015-10141β30Aug 11, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The long shadow to emerge as other Git repositoriesβ18Feb 25, 2026Updated 2 months ago
- Useful Alfred Snippets for Pentestβ18Dec 5, 2024Updated last year
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeoverβ16Jul 5, 2022Updated 3 years ago
- β12Jan 28, 2025Updated last year
- spring4shell | CVE-2022-22965β23Jun 30, 2022Updated 3 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat oβ¦β23Jan 6, 2026Updated 4 months ago
- AWS Security Toolβ29Jan 1, 2024Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedβ¦β18Mar 25, 2022Updated 4 years ago
- ζΏε½±η¨η nuclei ζΌζ«ζ¨‘ζΏβ14Jun 11, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applicaβ¦β22May 14, 2025Updated 11 months ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.β17Jun 18, 2025Updated 10 months ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β22Apr 19, 2022Updated 4 years ago
- Lurker is a cross-platform, companion implant to Cobalt Strike built with Goβ33Mar 27, 2026Updated last month
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 3 years ago
- PHP lab to test captcha bypassingβ30Jan 8, 2024Updated 2 years ago
- Generate Proxy DLLs in Rustβ51Mar 2, 2026Updated 2 months ago