Post Exploitation

Explore 28 curated cybersecurity tools, with 15,161 visitors searching for solutions

Fortra Cobalt Strike Logo

Threat emulation tool for adversary simulations and red team operations

0
Guide to Ethical Hacking Logo

A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

5
barq Logo

A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.

0
LaZagne Project Logo

Open source application for retrieving passwords stored on a local computer with support for various software and platforms.

0
Merlin Logo

A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0
CloudCopy Logo

CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.

0
NimPlant Logo

A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.

0
swap_digger Logo

A bash script for automating Linux swap analysis for post-exploitation or forensics purposes.

0
Havoc Logo

Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.

0
Kubesploit Logo

A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
Papa Shango Logo

A Linux process injection tool that uses ptrace() to inject assembly-based shellcode into running processes without NULL byte restrictions.

0
SharpC2 Logo

SharpC2 is a C#-based Command and Control framework that provides remote access capabilities for penetration testing and red team operations.

0
PowerShell Cheat Sheet v. 4.0 Logo

A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.

0
shad0w Logo

A post-exploitation framework designed to operate covertly on heavily monitored environments.

0
Forensia Logo

Anti-forensics tool for Red Teamers to erase footprints and test incident response capabilities.

0
SharpSploit Logo

A comprehensive .NET post-exploitation library designed for advanced security testing.

0
SILENTTRINITY Logo

SILENTTRINITY is a Python-based, asynchronous C2 framework that uses .NET scripting languages for post-exploitation activities without relying on PowerShell.

0
MicroBurst Logo

A PowerShell toolkit for penetration testing Microsoft Azure environments, providing discovery, configuration auditing, and post-exploitation capabilities.

0
Pupy Logo

Pupy is an open-source, cross-platform C2 framework that provides remote access and control capabilities for compromised systems across Windows, Linux, OSX, and Android platforms.

0
CrackMapExec Logo

A post-exploitation tool for pentesting Active Directory

0
PHPsploit Logo

A PHP-based command and control framework that maintains persistent web server access through polymorphic backdoors and HTTP header communication tunneling.

0
GraphSpy Logo

GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.

0