Offensive Security
post-exploitation

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

barq Logo

barq

0 (0)

A post-exploitation framework for attacking running AWS infrastructure

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

Merlin Logo

Merlin

0 (0)

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.

Havoc Logo

Havoc

0 (0)

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

A cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments

A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to conceal malicious activities from detection.

shad0w Logo

shad0w

0 (0)

A post-exploitation framework designed to operate covertly on heavily monitored environments.

A comprehensive .NET post-exploitation library designed for advanced security testing.

Modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework with Python 3 and .NETs DLR.

A PowerShell toolkit for attacking Azure environments

Pupy Logo

Pupy

0 (0)

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A post-exploitation tool for pentesting Active Directory

PoshC2 Logo

PoshC2

0 (0)

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.