All Projects → enty8080 → Thoron

enty8080 / Thoron

Licence: mit
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Thoron

Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (+113.79%)
Mutual labels:  remote-control, kali-linux, exploit, backdoor, post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+1040.23%)
Mutual labels:  kali-linux, exploit, backdoor, rat, post-exploitation
Evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
Stars: ✭ 1,826 (+1998.85%)
Mutual labels:  pentesting, backdoor, rat, post-exploitation, reverse-shell
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (+63.22%)
Mutual labels:  remote-control, kali-linux, backdoor, rat, post-exploitation
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Stars: ✭ 1,934 (+2122.99%)
Mutual labels:  backdoor, exploit, rat, post-exploitation, kali-linux
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-59.77%)
Mutual labels:  backdoor, reverse-shell, exploit, rat, pentesting
Pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Stars: ✭ 6,737 (+7643.68%)
Mutual labels:  pentesting, backdoor, rat, post-exploitation, reverse-shell
Androrat
A Simple android remote administration tool using sockets. It uses java on the client side and python on the server side
Stars: ✭ 187 (+114.94%)
Mutual labels:  exploit, backdoor, rat, reverse-shell
Reverse Shell
Reverse Shell as a Service
Stars: ✭ 1,281 (+1372.41%)
Mutual labels:  pentesting, exploit, vulnerability, reverse-shell
Rspet
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Stars: ✭ 251 (+188.51%)
Mutual labels:  pentesting, backdoor, post-exploitation, reverse-shell
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+714.94%)
Mutual labels:  remote-control, backdoor, rat
Vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+1140.23%)
Mutual labels:  pentesting, exploit, vulnerabilities
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+339.08%)
Mutual labels:  pentesting, exploit, vulnerability
rsGen
rsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (-18.39%)
Mutual labels:  reverse-shell, exploit, vulnerability
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+240.23%)
Mutual labels:  backdoor, rat, kali-linux
Torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+377.01%)
Mutual labels:  rat, post-exploitation, reverse-shell
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (+387.36%)
Mutual labels:  pentesting, post-exploitation, reverse-shell
Tinkerershell
A simple python reverse shell written just for fun.
Stars: ✭ 62 (-28.74%)
Mutual labels:  backdoor, rat, reverse-shell
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+733.33%)
Mutual labels:  linux-kernel, pentesting, backdoor
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+631.03%)
Mutual labels:  pentesting, backdoor, rat

Thoron Framework

⚠️ Under construction, do not use it now! ⚠️

logo

thoron_1


About Thoron Framework

Thoron Framework is a Linux post-exploitation framework that exploits
Linux TCP vulnerability to provide a shell-like connection. Thoron Framework 
has the ability to create simple payloads to provide Linux TCP attack. 

Getting started

Thoron installation

cd thoron

chmod +x install.sh

./install.sh

Thoron uninstallation

cd thoron

chmod +x uninstall.sh

./uninstall.sh


Thoron Framework execution

To run Thoron Framework you should 
execute the following command.

thoron


Why Thoron Framework

  • Simple and clear UX/UI.
Thoron Framework has a simple and clear UX/UI. 
It is easy to understand and it will be easier 
for you to master the Thoron Framework.
  • A lot of different payloads.
There are a lot of different Linux payloads in 
Thoron Framework such as Shell and Python payloads.
  • Powerful ThorCat listener.
There is a powerful ThorCat listener in Thoron 
Framework that supports secure SSL connection 
and other useful functions.

thoron_2


Thoron Framework disclaimer

Usage of the Thoron Framework for attacking targets without prior mutual consent is illegal.
It is the end user's responsibility to obey all applicable local, state, federal, and international laws.
Developers assume no liability and are not responsible for any misuse or damage caused by this program.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].