Loading...
Browse 41 post exploitation tools
Manual + automated network pen testing service for compliance & vuln assessment.
Bundled offensive security suites combining pen testing, red teaming, and VM.
Red team toolkit for EDR evasion, initial access, and post-exploitation.
Post-exploitation threat emulation platform for red team operations.
Managed expert-led pentesting service covering web, network, and cloud.
PTES-aligned penetration testing service simulating real-world attacks.
Post-quantum photonic layer security for data-in-transit protection
5G mobile travel router with optional private APN and post-quantum encryption
3-day Metasploit training course focused on Ruby scripting & custom modules
5-day training course on advanced penetration testing techniques
5-day training bootcamp on advanced persistence and data exfiltration techniques
Managed continuous threat exposure mgmt platform with expert-driven testing
Threat emulation tool for adversary simulations and red team operations
Penetration testing software for simulating attacks and validating vulnerabilities
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
A post-exploitation framework for attacking AWS infrastructure, enabling attacks on EC2 instances without SSH keypairs and extraction of AWS secrets and parameters.
Open source application for retrieving passwords stored on a local computer with support for various software and platforms.
A cross-platform HTTP/2 Command & Control framework written in Golang for post-exploitation activities and remote system management.
PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.
CloudCopy implements a cloud version of the Shadow Copy attack to extract domain user hashes from AWS-hosted domain controllers by creating and mounting volume snapshots.
A lightweight Command and Control (C2) implant written in Nim that provides remote access capabilities for penetration testing and red team operations.
A bash script for automating Linux swap analysis for post-exploitation or forensics purposes.
Havoc is a malleable post-exploitation command and control framework that provides a client-server architecture with payload generation, customizable C2 profiles, and team collaboration capabilities for red team operations.
A cross-platform post-exploitation HTTP/2 Command & Control framework designed specifically for testing and exploiting containerized environments including Docker and Kubernetes.
Get strategic cybersecurity insights in your inbox