-
Updated
Apr 8, 2022
#
post-exploitation
Here are 157 public repositories matching this topic...
A collection of hacking tools, resources and references to practice ethical hacking.
security
roadmap
hacking
penetration-testing
pentesting
post-exploitation
pentest
exploitation
hacking-tool
frameworks
information-gathering
web-hacking
hacktools
fsociety Hacking Tools Pack – A Penetration Testing Framework
python
network
desktop
finder
brute-force-attacks
post-exploitation
exploitation
port-scanning
information-gathering
web-hacking
fsociety
penetration-testing-framework
fsociety-hacking
-
Updated
May 13, 2022 - Python
An open-source post-exploitation framework for students, researchers and developers.
encrypted-connections
post-exploitation
platform-independent
zero-configuration
no-dependencies
antiforensics
reverse-shells
-
Updated
May 25, 2022 - Python
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
android
python
windows
linux
shell
backdoor
reverse-shell
rat
pentesting
post-exploitation
remote-access
payload
mac-os
meterpreter
pupy
reflective-injection
remote-admin-tool
-
Updated
Mar 29, 2022 - Python
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
linux
unix
reverse-shell
binaries
post-exploitation
bypass
exfiltration
blueteam
redteam
bind-shell
gtfobins
-
Updated
May 15, 2022 - HTML
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
-
Updated
Apr 13, 2022 - Go
A tool to dump the login password from the current linux user
-
Updated
Jun 26, 2020 - C
Redteam operation platform with webui 图形化红队行动辅助平台
-
Updated
May 21, 2022
An evil RAT (Remote Administration Tool) for macOS / OS X.
-
Updated
Feb 10, 2021 - Python
2
nil0x42
commented
Oct 3, 2020
Current implementation of proclist
plugin uses win32_ps_list_procs()
php function on Windows host.
Therefore, linux implementation is a simple system("ps -a")
, which is OPSEC unsafe, an would probably trigger EDR alerts.
A better implementation should avoid relying on system command execution.
to be documented
stealth
impacts stealthness and evasion capabilities
good first issue
issue is good for first-time contributors
venom - C2 shellcode generator/compiler/handler
compiler
handler
rat
shellcode
post-exploitation
msfvenom
metasploit
reverse-tcp-shell
multi-platform-payloads
-
Updated
Mar 12, 2022 - Shell
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++ like CobaltStrike.
windows
macos
linux
golang
qt
backdoor
cross-platform
grpc
trojan
rat
macosx
post-exploitation
beacon
cobalt-strike
red-team
c2
redteam
cobaltstrike
-
Updated
Mar 11, 2022 - C++
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
agent
kubernetes
golang
security
containers
http2
post-exploitation
security-tools
c2
penetration-testing-framework
command-and-control
red-teams
penetration-testing-tools
redteam-tools
-
Updated
May 3, 2022 - Go
C2/post-exploitation framework
python
pyqt5
python3
spyware
post-exploitation
pentest
offensive-security
red-team
security-tools
pentest-tool
command-and-control
qtframework
-
Updated
Jul 28, 2021 - Python
Linux/Windows post-exploitation framework made by linux user
linux
rootkit
malware
rat
post-exploitation
stealth
hacking-tool
local-privilege-escalation
redteaming
redteam
trojan-malware
emp3r0r
cve-2021-4034
-
Updated
May 21, 2022 - Go
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
windows
linux
golang
reverse-shell
cross-platform
persistence
tor
rpc
transport
rat
keylogger
post-exploitation
payload
privilege-escalation
remote-admin-tool
uac-bypass
command-and-control
shell-reverse
reverse-shells
uacbypass
-
Updated
Mar 28, 2022 - Go
Bash post exploitation toolkit
-
Updated
Sep 24, 2020 - Shell
Load shellcode into a new process
-
Updated
Jun 2, 2021 - Go
A Python Package for Data Exfiltration
python
slack
dns
packets
bgp
ftp
qrcode
icmp
steganography
http-cookies
pop3
post-exploitation
quic
data-exfiltration
regin
-
Updated
Jun 28, 2021 - Python
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
-
Updated
Feb 16, 2021 - Python
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
linux
backdoor
rootkit
infinite-scroll
postgresql
ghost
indonesia
inject
post-exploitation
msfvenom
unlimited
metasploit
-
Updated
Mar 9, 2020 - Shell
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
-
Updated
Apr 29, 2022 - Python
A framework for Backdoor development!
python
shell
agent
crypto
encryption
stream
reverse-shell
handler
rce
steganography
pentesting
post-exploitation
payload
communication-channel
stego
-
Updated
Mar 18, 2018 - Python
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
-
Updated
Jun 26, 2021 - Shell
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
-
Updated
Sep 20, 2021
Network Pivoting Toolkit
-
Updated
Jan 27, 2020 - Python
Orc is a post-exploitation framework for Linux written in Bash
-
Updated
Nov 12, 2019 - Shell
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
osint
anti-virus
password
owasp
vulnerability
recon
post-exploitation
burp
pentest
payload
privilege-escalation
iot-security
kali
cobalt-strike
social-engineering-attacks
metasploit
data-exfiltration
c2
wifi-hacking
threat-hunt
-
Updated
Dec 23, 2019
Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
-
Updated
Feb 24, 2022 - AutoIt
Improve this page
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."
There's enough modules now that this should probably be done, cause scrolling through a ton of modules isn't exactly ideal.