operatorequals / covertutils
A framework for Backdoor development!
☆437Updated 7 years ago
Alternatives and similar repositories for covertutils:
Users that are interested in covertutils are comparing it to the libraries listed below
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- The Hacker's ToolBox☆188Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Updated 6 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆523Updated 8 years ago
- Remote administration service which uses twitter as a command and control server☆713Updated 4 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆306Updated 7 years ago
- port of mimipenguin.sh in python with some additional protection features☆207Updated 8 years ago
- Python framework for IT security tools☆266Updated 8 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆317Updated 6 years ago
- Script to steal passwords from ssh.☆480Updated 6 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆406Updated last year
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆771Updated 4 years ago
- A powerful and extensible wireless drop box☆266Updated 6 years ago
- 🕷 A lightning fast multithreaded network scanner framework with modules.☆324Updated 5 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated 9 months ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Updated last year
- just for fun ¯\_(ツ)_/¯☆270Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆727Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Updated 7 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆137Updated 3 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆228Updated 6 years ago