khr0x40sh / Galvatron
Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but effective obfuscation. Egress over ICMP and DNS are planned as features. Lastly, the server code is designed to setup the C2 on a LAMP-esque server. The default creds are admin/admin.
☆41Updated 3 years ago
Alternatives and similar repositories for Galvatron:
Users that are interested in Galvatron are comparing it to the libraries listed below
- ☆34Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- pwning & info gathering via user browser☆39Updated 9 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 9 years ago
- ☆21Updated 8 years ago
- Source Code Intelligence☆30Updated 7 years ago
- SQL SERVER Exploitation.☆27Updated 8 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 7 years ago
- PHDAYS |||☆17Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- ☆58Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Babel Scripting Framework☆42Updated 4 years ago
- Exploits, Fuzzers, Scripts etc☆33Updated 4 years ago
- post-exploitation tools☆15Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- VBS Reversed TCP Meterpreter Stager☆86Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Covert Channels for C2 Server☆17Updated 9 years ago