Skip to content
#

post-exploitation

Here are 148 public repositories matching this topic...

phpsploit

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

  • Updated Mar 9, 2020
  • Shell

[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.

  • Updated Dec 23, 2019

Improve this page

Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more