Topic: post-exploitation Goto Github
Some thing interesting about post-exploitation
Some thing interesting about post-exploitation
post-exploitation,A tool that allows you to search for vulnerable android devices across the world and exploit them.
User: 0x1ca3
post-exploitation,A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
User: adrianvollmer
Home Page: https://adrianvollmer.github.io/PowerHub/
post-exploitation,A cross platform C2/post-exploitation framework.
User: b23r0
post-exploitation,mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Organization: blackarrowsec
post-exploitation,Load shellcode into a new process
User: brimstone
post-exploitation,An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
User: byt3bl33d3r
post-exploitation,WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
User: codextf2
post-exploitation,A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Organization: cyberark
Home Page: https://github.com/cyberark/
post-exploitation,Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
User: emilyanncr
post-exploitation,A C2 post-exploitation framework
User: enkomio
post-exploitation,Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Organization: entysec
Home Page: https://entysec.com
post-exploitation,Modular penetration testing platform that enables you to write, test, and execute exploit code.
Organization: entysec
Home Page: https://hatsploit.com
post-exploitation,SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Organization: entysec
Home Page: https://theapplewiki.com/wiki/SeaShell
post-exploitation,Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
User: frissi0n
post-exploitation,Attack Surface Management & Red Team Simulation Platform ไบ่็ฝๆปๅป้ข็ฎก็&็บข้ๆจกๆๅนณๅฐ
User: funnywolf
Home Page: https://www.yuque.com/vipersec
post-exploitation,GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Organization: gtfobins
Home Page: https://gtfobins.github.io
post-exploitation,A tool to dump the login password from the current linux user
User: huntergregal
post-exploitation,Linux/Windows post-exploitation framework made by linux user
User: jm33-m0
Home Page: https://infosec.exchange/@jm33
post-exploitation,ADB For Hackers (:
User: jxroot
post-exploitation,Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
User: leo4j
post-exploitation,C2/post-exploitation framework
User: loseys
post-exploitation,ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
User: lu4p
Home Page: https://lu4p.github.io/ToRat
post-exploitation,An open-source post-exploitation framework for students, researchers and developers.
User: malwaredllc
Home Page: https://byob.dev
post-exploitation,fsociety Hacking Tools Pack โ A Penetration Testing Framework
User: manisso
post-exploitation,An evil RAT (Remote Administration Tool) for macOS / OS X.
User: marten4n6
post-exploitation,Automating Host Exploitation with AI
User: mazen160
Home Page: https://mazinahmed.net/blog/shennina-exploitation-framework/
post-exploitation,SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
User: megamansec
Home Page: https://megamansec.github.io/SSH-Snake/
post-exploitation,Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
User: n1nj4sec
post-exploitation,Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
User: ne0nd0g
post-exploitation,An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
User: nicocha30
post-exploitation,Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
User: nil0x42
post-exploitation,PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
User: not-sekiun
post-exploitation,A framework for Backdoor development!
User: operatorequals
Home Page: http://covertutils.readthedocs.io
post-exploitation,A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
User: p0dalirius
Home Page: https://podalirius.net/
post-exploitation,RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
User: panagiks
post-exploitation,Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
User: paulnorman01
post-exploitation,venom - C2 shellcode generator/compiler/handler
User: r00t-3xp10it
post-exploitation,Bash post exploitation toolkit
Organization: redcode-labs
post-exploitation,OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
Organization: redsection
post-exploitation,Network Pivoting Toolkit
User: redteamoperations
post-exploitation,Manipulating and Abusing Windows Access Tokens.
User: s1ckb0y1337
post-exploitation,This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
User: screetsec
post-exploitation,:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
User: script1337
Home Page: https://scatter.sellup.io
post-exploitation, swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
User: sevagas
Home Page: http://blog.sevagas.com/?Digging-passwords-in-Linux-swap
post-exploitation,Post-exploitation tool to cover your tracks on a compromised machine (beta)
User: sundowndev
post-exploitation,A collection of hacking tools, resources and references to practice ethical hacking.
User: sundowndev
post-exploitation,Chrome Keylogger Extension | Post Exploitation Tool
Organization: undeadsec
post-exploitation,Offensive tooling notes and experiments in AutoIt v3 (https://www.autoitscript.com/site/autoit/)
User: v1v1
Home Page: https://thevivi.net/blog/pentesting/2021-11-22-operating-with-autoit/
post-exploitation,A Python Package for Data Exfiltration
User: ytisf
Home Page: https://pyexfil.morirt.com
post-exploitation,Orc is a post-exploitation framework for Linux written in Bash
User: zmarch
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.