Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.
☆527Dec 18, 2024Updated last year
Alternatives and similar repositories for tornado
Users that are interested in tornado are comparing it to the libraries listed below
Sorting:
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆319Feb 20, 2026Updated last month
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,024Mar 13, 2023Updated 3 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- [WIP] A free and open-source, modular Remote Administration Tool (RAT) / Payload Dropper written in Go(lang) with a flexible command and …☆231Dec 3, 2023Updated 2 years ago
- A quick handy script to harvest credentials off of a user during a Red Team and get execution of a file from the user☆252Mar 7, 2022Updated 4 years ago
- DNSrecon tool with GUI for Kali Linux☆60Dec 12, 2022Updated 3 years ago
- Python AV Evasion Tools☆518Oct 14, 2025Updated 5 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,434Jan 19, 2025Updated last year
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆372Sep 17, 2025Updated 6 months ago
- A C2 post-exploitation framework☆484Jan 24, 2024Updated 2 years ago
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆736Jun 28, 2025Updated 8 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆915Dec 9, 2023Updated 2 years ago
- 🚪 Quick & dirty Wordpress Command Execution Shell☆66Jan 24, 2022Updated 4 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,353May 21, 2025Updated 10 months ago
- Antivirus evasion project☆1,154Jan 19, 2025Updated last year
- grim reaper c2☆346Nov 19, 2022Updated 3 years ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆358Jul 15, 2023Updated 2 years ago
- An XSS exploitation command-line interface and payload generator.☆1,417Jan 19, 2025Updated last year
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- Open source pre-operation C2 server based on python and powershell☆763Jul 6, 2021Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Dec 19, 2023Updated 2 years ago
- ParadoxiaRat : Native Windows Remote access Tool.☆822Apr 18, 2023Updated 2 years ago
- Open source C2 server created for stealth red team operations☆836Sep 26, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,501Dec 21, 2023Updated 2 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,779Oct 26, 2024Updated last year
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆1,003Jan 19, 2024Updated 2 years ago
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.☆607Dec 2, 2023Updated 2 years ago
- ☆336May 29, 2023Updated 2 years ago
- Performing Indirect Clean Syscalls☆605Apr 19, 2023Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Nov 25, 2022Updated 3 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,061Oct 14, 2025Updated 5 months ago
- WhiteBeam: Transparent endpoint security☆100Mar 29, 2023Updated 2 years ago
- A simple shell code encryptor/decryptor/executor to bypass anti virus.☆469Dec 13, 2021Updated 4 years ago
- a lightweight, flexible and novel open source poc verification framework☆237May 21, 2022Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Mar 3, 2022Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,880Aug 18, 2023Updated 2 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆845Aug 16, 2022Updated 3 years ago