khr0x40sh / GalvatronLinks
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆41Updated 3 years ago
Alternatives and similar repositories for Galvatron
Users that are interested in Galvatron are comparing it to the libraries listed below
Sorting:
- ~ BannerGrab☆25Updated 8 years ago
- PHDAYS |||☆17Updated 12 years ago
- ☆34Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- pwning & info gathering via user browser☆39Updated 10 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆73Updated 4 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆43Updated 3 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆151Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago