khr0x40sh / Galvatron
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆41Updated 3 years ago
Alternatives and similar repositories for Galvatron:
Users that are interested in Galvatron are comparing it to the libraries listed below
- ~ BannerGrab☆26Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- ☆34Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆21Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- Platform for Browser Exploitation☆34Updated 9 years ago
- PHDAYS |||☆17Updated 11 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- Custom stagers with python encrypting proxy☆40Updated 9 years ago
- ☆47Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- Source Code Intelligence☆30Updated 7 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 6 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- A modular distributed penetration testing tool.☆41Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago