operatorequals / covertutils
A framework for Backdoor development!
☆437Updated 7 years ago
Alternatives and similar repositories for covertutils:
Users that are interested in covertutils are comparing it to the libraries listed below
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆404Updated last year
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- powerful auto-backdooring utility☆746Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- ☆513Updated last year
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆498Updated 5 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Malware exploits☆543Updated 5 years ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- A Reverse Engineering Tool for py2exe applications.☆210Updated 7 years ago
- EternalRocks worm☆456Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆545Updated 6 months ago
- Python framework for IT security tools☆266Updated 8 years ago
- Remote administration service which uses twitter as a command and control server☆711Updated 4 years ago
- Script to steal passwords from ssh.