Using Metasploit and Incognito to gain access to a remote machine without any user interaction!
No download links available.