-
Updated
Feb 17, 2021
#
post-exploitation
Here are 148 public repositories matching this topic...
roadmap
hacking
penetration-testing
post-exploitation
vulnerabilities
pentest
exploitation
hacking-tool
frameworks
information-gathering
web-hacking
hacktools
fsociety Hacking Tools Pack – A Penetration Testing Framework
python
network
desktop
finder
brute-force-attacks
post-exploitation
exploitation
port-scanning
information-gathering
web-hacking
fsociety
penetration-testing-framework
fsociety-hacking
-
Updated
Aug 3, 2021 - Python
An open-source post-exploitation framework for students, researchers and developers.
encrypted-connections
post-exploitation
platform-independent
zero-configuration
no-dependencies
antiforensics
reverse-shells
-
Updated
Aug 12, 2021 - Python
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
android
python
windows
linux
shell
backdoor
reverse-shell
rat
pentesting
post-exploitation
remote-access
payload
mac-os
meterpreter
pupy
reflective-injection
remote-admin-tool
-
Updated
Apr 30, 2021 - Python
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
linux
unix
reverse-shell
binaries
post-exploitation
bypass
exfiltration
blueteam
redteam
bind-shell
gtfobins
-
Updated
Jul 31, 2021 - HTML
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
-
Updated
Aug 4, 2021 - Go
A tool to dump the login password from the current linux user
-
Updated
Jun 26, 2020 - C
An evil RAT (Remote Administration Tool) for macOS / OS X.
-
Updated
Feb 10, 2021 - Python
nil0x42
commented
Oct 3, 2020
Current implementation of proclist
plugin uses win32_ps_list_procs()
php function on Windows host.
Therefore, linux implementation is a simple system("ps -a")
, which is OPSEC unsafe, an would probably trigger EDR alerts.
A better implementation should avoid relying on system command execution.
Viper (炫彩蛇) 开源图形化内网渗透工具
-
Updated
Aug 15, 2021
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
android
hack
backdoor
adb
exploit
hacking
android-device
rat
remote-shell
post-exploitation
android-debug-bridge
kali-linux
exploitation-framework
remote-access
android-rat
hacking-tools
android-hacking
android-hack
android-exploit
entysec
-
Updated
Aug 14, 2021 - Python
venom - C2 shellcode generator/compiler/handler
compiler
handler
rat
shellcode
post-exploitation
msfvenom
metasploit
reverse-tcp-shell
multi-platform-payloads
-
Updated
Aug 1, 2021 - Shell
C2/post-exploitation framework
python
pyqt5
python3
spyware
post-exploitation
pentest
offensive-security
red-team
security-tools
pentest-tool
command-and-control
qtframework
-
Updated
Jul 28, 2021 - Python
Bash post exploitation toolkit
-
Updated
Sep 24, 2020 - Shell
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
agent
kubernetes
golang
security
containers
http2
post-exploitation
security-tools
c2
penetration-testing-framework
command-and-control
red-teams
penetration-testing-tools
redteam-tools
-
Updated
Jun 20, 2021 - Go
A Python Package for Data Exfiltration
python
slack
dns
packets
bgp
ftp
qrcode
icmp
steganography
http-cookies
pop3
post-exploitation
quic
data-exfiltration
regin
-
Updated
Jun 28, 2021 - Python
Load shellcode into a new process
-
Updated
Jun 2, 2021 - Go
linux post-exploitation framework made by linux user
linux
rootkit
malware
rat
post-exploitation
stealth
hacking-tool
redteaming
redteam
trojan-malware
emp3r0r
-
Updated
Aug 6, 2021 - Go
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
windows
linux
golang
reverse-shell
cross-platform
persistence
tor
rpc
transport
rat
keylogger
post-exploitation
payload
privilege-escalation
remote-admin-tool
uac-bypass
command-and-control
shell-reverse
reverse-shells
uacbypass
-
Updated
Jul 23, 2021 - Go
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
-
Updated
Feb 16, 2021 - Python
Sifter aims to be a fully loaded Op Centre for Pentesters
osint
network
scanner
penetration-testing
pentesting
recon
post-exploitation
pentest
exploitation
wpscan
sifter
web-scanner
vulnerability-scanner
blackwidow
osinttool
osint-reconnaissance
attacksurface
s1l3nt78
recon-tasks
exploitation-frameworks
-
Updated
Aug 12, 2021 - Shell
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
linux
backdoor
rootkit
infinite-scroll
postgresql
ghost
indonesia
inject
post-exploitation
msfvenom
unlimited
metasploit
-
Updated
Mar 9, 2020 - Shell
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
-
Updated
Jul 20, 2021 - Python
A framework for Backdoor development!
python
shell
agent
crypto
encryption
stream
reverse-shell
handler
rce
steganography
pentesting
post-exploitation
payload
communication-channel
stego
-
Updated
Mar 18, 2018 - Python
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
-
Updated
Jun 26, 2021 - Shell
Orc is a post-exploitation framework for Linux written in Bash
-
Updated
Nov 12, 2019 - Shell
Network Pivoting Toolkit
-
Updated
Jan 27, 2020 - Python
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
-
Updated
Jan 27, 2018
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
osint
anti-virus
password
owasp
vulnerability
recon
post-exploitation
burp
pentest
payload
privilege-escalation
iot-security
kali
cobalt-strike
social-engineering-attacks
metasploit
data-exfiltration
c2
wifi-hacking
threat-hunt
-
Updated
Dec 23, 2019
Improve this page
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."
There's enough modules now that this should probably be done, cause scrolling through a ton of modules isn't exactly ideal.