- A post-exploitation Framework, designed to use compromised Machines as pivots, collective botnets, single botnets and more.
-
Current built module, includes a proxy , traffic from a random selected Port will be rerouted through that machine, to another random selected Port, thus posing as that machine.
-
Ports will be communicated to a Port designed to only accept connections
-
Still in Progress