Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆40Oct 14, 2021Updated 4 years ago
Alternatives and similar repositories for Galvatron
Users that are interested in Galvatron are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆16May 6, 2015Updated 11 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆410Jul 14, 2016Updated 9 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 11 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆50Feb 5, 2014Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- ☆12Aug 29, 2025Updated 8 months ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- ☆11Jul 16, 2017Updated 8 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Access windows machine remotely on HTTP☆11Oct 28, 2020Updated 5 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆17Feb 10, 2017Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Heap implementation for some JavaScript VM☆27Apr 8, 2015Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆36Jul 13, 2016Updated 9 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 10 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Jul 12, 2019Updated 6 years ago
- Simple C# reverse shell with shellcode and process injection☆40May 13, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Remote Administration Tool for Windows☆19Sep 5, 2015Updated 10 years ago
- ☆128Jun 12, 2015Updated 10 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆70Nov 25, 2014Updated 11 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆14Jan 17, 2016Updated 10 years ago