khr0x40sh / Galvatron
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆38Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Galvatron
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 4 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- PHDAYS |||☆17Updated 11 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- ☆34Updated 8 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Slides from previous conference talks☆40Updated 7 years ago