An open API service indexing awesome lists of open source software.

https://github.com/krishpranav/postexploit

A simple Post Exploitation C2 Tool
https://github.com/krishpranav/postexploit

c c-plus-plus exploit-development exploitation exploitation-framework exploits golang hacking linux macos post post-exploit postexplotation python python-security security security-tools vscode vulnerability windows

Last synced: 3 months ago
JSON representation

A simple Post Exploitation C2 Tool

Awesome Lists containing this project

README

        

# PostExploit
A simple Post Exploitation C2 Tool

[![forthebadge](https://forthebadge.com/images/badges/made-with-python.svg)](https://forthebadge.com)
[![forthebadge](https://forthebadge.com/images/badges/made-with-go.svg)](https://forthebadge.com)
[![forthebadge](https://forthebadge.com/images/badges/made-with-c-plus-plus.svg)](https://forthebadge.com)

# Installation:
```
$ git clone https://github.com/krishpranav/PostExploit
```

# Running The Server:
```
$ python3 server.py
```

# Running The Client:
```
$ python3 client.py
```

# Usage

- how to use this tool??
```
$ run the client script on the target machine
$ and run the server in your machine
```

- an example of running a simple powershell command on the target machine by post exploitation method

```
[*] Received callback from '192.168.0.5'
[+] Command to run?
192.168.0.5> ls -la
[*] Command Sent: ls -la
[*] Command Sent: ls -la
[+] Results from 192.168.0.5
total 32
file one
file two
```