SILENTTRINITY Logo

SILENTTRINITY

0
Free
Visit Website

SILENTTRINITY is a modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework powered by Python 3 and .NETs DLR. It's the culmination of an extensive amount of research into using embedded third-party .NET scripting languages to dynamically call .NET API's, a technique the author coined as BYOI (Bring Your Own Interpreter). The aim of this tool and the BYOI concept is to shift the paradigm back to PowerShell style like attacks (as it offers much more flexibility over traditional C# tradecraft) only without using PowerShell in anyway. Some of the main features that distinguish SILENTTRINITY are: Multi-User & Multi-Server - Supports multi-user collaboration. Additionally, the client can connect to and control multiple Teamservers. Client and Teamserver Built in Python 3.7 - Latest and greatest features of the Python language are used, heavy use of Asyncio provides ludicrous speeds. Real-time Updates and Communication - Use of Websockets allow for real-time communication and updates between the Client and Teamserver. Focus on Usability with an Extremely Modern CLI - Powered by prompt-toolkit. Dynamic Evaluation/Compilation Using .NET Scripting Languages

FEATURES

ALTERNATIVES

Collection of vulnerable ARM binaries for beginner vulnerability researchers & exploit developers.

A list of useful payloads and bypasses for Web Application Security.

A lightweight, first-stage C2 implant written in Nim for remote access and control.

A PoC tool for generating Excel files with embedded macros without using Excel.

A digital archive of the internet, allowing users to capture and browse archived web pages.

A powerful enumeration tool for discovering assets and subdomains.

A tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) for offensive security purposes.

CrackMapExec (CME) - A tool for querying internal database for host and credential information in cybersecurity.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved