https://github.com/krishpranav/postexploit
A simple Post Exploitation C2 Tool
https://github.com/krishpranav/postexploit
c c-plus-plus exploit-development exploitation exploitation-framework exploits golang hacking linux macos post post-exploit postexplotation python python-security security security-tools vscode vulnerability windows
Last synced: 3 months ago
JSON representation
A simple Post Exploitation C2 Tool
- Host: GitHub
- URL: https://github.com/krishpranav/postexploit
- Owner: krishpranav
- Created: 2021-08-31T08:50:59.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2021-08-31T09:11:22.000Z (almost 4 years ago)
- Last Synced: 2025-03-04T13:46:28.704Z (4 months ago)
- Topics: c, c-plus-plus, exploit-development, exploitation, exploitation-framework, exploits, golang, hacking, linux, macos, post, post-exploit, postexplotation, python, python-security, security, security-tools, vscode, vulnerability, windows
- Language: Python
- Homepage:
- Size: 6.84 KB
- Stars: 1
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# PostExploit
A simple Post Exploitation C2 Tool[](https://forthebadge.com)
[](https://forthebadge.com)
[](https://forthebadge.com)# Installation:
```
$ git clone https://github.com/krishpranav/PostExploit
```# Running The Server:
```
$ python3 server.py
```# Running The Client:
```
$ python3 client.py
```# Usage
- how to use this tool??
```
$ run the client script on the target machine
$ and run the server in your machine
```- an example of running a simple powershell command on the target machine by post exploitation method
```
[*] Received callback from '192.168.0.5'
[+] Command to run?
192.168.0.5> ls -la
[*] Command Sent: ls -la
[*] Command Sent: ls -la
[+] Results from 192.168.0.5
total 32
file one
file two
```