khr0x40sh / GalvatronLinks
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆41Updated 3 years ago
Alternatives and similar repositories for Galvatron
Users that are interested in Galvatron are comparing it to the libraries listed below
Sorting:
- ~ BannerGrab☆26Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- ☆22Updated 8 years ago
- ☆34Updated 8 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- ☆47Updated 9 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- PHDAYS |||☆17Updated 12 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- Custom stagers with python encrypting proxy☆39Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- MacroSploit is a modified version of unicorn used to generate a social engineering Microsoft Office macro payload for penetration testers…☆8Updated 10 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago