khr0x40sh / Galvatron
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆41Updated 3 years ago
Alternatives and similar repositories for Galvatron:
Users that are interested in Galvatron are comparing it to the libraries listed below
- pwning & info gathering via user browser☆39Updated 10 years ago
- ~ BannerGrab☆26Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ☆34Updated 8 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- MacroSploit is a modified version of unicorn used to generate a social engineering Microsoft Office macro payload for penetration testers…☆8Updated 10 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- ☆47Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- PHDAYS |||☆17Updated 11 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- POC of code that downloads and executes shellcode in memory.☆80Updated 10 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆87Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆59Updated 9 years ago