Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
Projects in Awesome Lists tagged with post-exploitation
A curated list of projects in awesome lists tagged with post-exploitation .
https://github.com/sundowndev/hacker-roadmap
A collection of hacking tools, resources and references to practice ethical hacking.
exploitation frameworks hacking hacking-tool hacktools information-gathering penetration-testing pentest pentesting post-exploitation roadmap security web-hacking
Last synced: 26 Sep 2024
https://github.com/gtfobins/gtfobins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
binaries bind-shell blueteam bypass exfiltration gtfobins linux post-exploitation redteam reverse-shell unix
Last synced: 29 Sep 2024
https://github.com/manisso/fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
brute-force-attacks desktop exploitation finder fsociety fsociety-hacking information-gathering network penetration-testing-framework port-scanning post-exploitation python web-hacking
Last synced: 30 Sep 2024
https://github.com/GTFOBins/GTFOBins.github.io
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
binaries bind-shell blueteam bypass exfiltration gtfobins linux post-exploitation redteam reverse-shell unix
Last synced: 30 Jul 2024
https://github.com/Manisso/fsociety
fsociety Hacking Tools Pack – A Penetration Testing Framework
brute-force-attacks desktop exploitation finder fsociety fsociety-hacking information-gathering network penetration-testing-framework port-scanning post-exploitation python web-hacking
Last synced: 30 Jul 2024
https://github.com/malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
antiforensics encrypted-connections no-dependencies platform-independent post-exploitation reverse-shells zero-configuration
Last synced: 30 Sep 2024
https://github.com/n1nj4sec/pupy
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
android backdoor linux mac-os meterpreter payload pentesting post-exploitation pupy python rat reflective-injection remote-access remote-admin-tool reverse-shell shell windows
Last synced: 25 Sep 2024
https://github.com/ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
agent c2 command-and-control golang http2 post-exploitation
Last synced: 30 Sep 2024
https://github.com/Ne0nd0g/merlin
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
agent c2 command-and-control golang http2 post-exploitation
Last synced: 30 Jul 2024
https://github.com/huntergregal/mimipenguin
A tool to dump the login password from the current linux user
password-extraction post-exploitation
Last synced: 30 Sep 2024
https://github.com/funnywolf/viper
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
attack attack-surface-management cobalt-strike docker metasploit-framework post-exploitation red-team-tools redteam viper
Last synced: 30 Sep 2024
https://github.com/FunnyWolf/Viper
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
attack attack-surface-management cobalt-strike docker metasploit-framework post-exploitation red-team-tools redteam viper
Last synced: 31 Jul 2024
https://github.com/entysec/ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell
Last synced: 30 Sep 2024
https://github.com/EntySec/Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell
Last synced: 01 Aug 2024
https://github.com/EntySec/ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell
Last synced: 30 Jul 2024
https://github.com/Marten4n6/EvilOSX
An evil RAT (Remote Administration Tool) for macOS / OS X.
backdoor mac macos macosx osx pentesting post-exploitation python python3 rat reverse-shell
Last synced: 31 Jul 2024
https://github.com/nil0x42/phpsploit
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
advanced-persistent-threat backdoor blackhat c2 command-and-control hacking hacking-framework hacktool persistence php-backdoor php-webshell php-webshell-backdoor post-exploitation privilege-escalation redteam stealth web-hacking webshell
Last synced: 30 Sep 2024
https://github.com/byt3bl33d3r/silenttrinity
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools
Last synced: 30 Sep 2024
https://github.com/byt3bl33d3r/SILENTTRINITY
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools
Last synced: 31 Jul 2024
https://github.com/nicocha30/ligolo-ng
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
golang offensive-security pentest-tool pentesting pivoting post-exploitation redteam tunneling
Last synced: 26 Sep 2024
https://github.com/r00t-3xp10it/venom
venom - C2 shellcode generator/compiler/handler
compiler handler metasploit msfvenom multi-platform-payloads post-exploitation rat reverse-tcp-shell shellcode
Last synced: 30 Sep 2024
https://github.com/jm33-m0/emp3r0r
Linux/Windows post-exploitation framework made by linux user
cve-2021-4034 emp3r0r hacking-tool linux local-privilege-escalation malware post-exploitation rat redteam redteaming rootkit stealth trojan-malware
Last synced: 25 Sep 2024
https://github.com/cyberark/kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
agent c2 command-and-control containers golang http2 kubernetes penetration-testing-framework penetration-testing-tools post-exploitation red-teams redteam-tools security security-tools
Last synced: 26 Sep 2024
https://github.com/megamansec/ssh-snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
bash cybersecurity exploitation exploitation-tool hacking hacking-tools pentesting post-exploitation redteam scanner security security-tools shell ssh ssh-hacking vulnerability-scanner worm
Last synced: 30 Sep 2024
https://github.com/MegaManSec/SSH-Snake
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
bash cybersecurity exploitation exploitation-tool hacking hacking-tools pentesting post-exploitation redteam scanner security security-tools shell ssh ssh-hacking vulnerability-scanner worm
Last synced: 01 Aug 2024
https://github.com/loseys/BlackMamba
C2/post-exploitation framework
command-and-control offensive-security pentest pentest-tool post-exploitation pyqt5 python python3 qtframework red-team security-tools spyware
Last synced: 04 Aug 2024
https://github.com/lu4p/torat
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
command-and-control cross-platform golang keylogger linux payload persistence post-exploitation privilege-escalation rat remote-admin-tool reverse-shell reverse-shells rpc shell-reverse tor transport uac-bypass uacbypass windows
Last synced: 03 Aug 2024
https://github.com/ScRiPt1337/Teardroid-phprat
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
android-botnet android-exploitation android-malware android-pentesting android-rat bot botnet hacking hacking-tool keylogger post-exploitation rat
Last synced: 04 Aug 2024
https://github.com/brimstone/go-shellcode
Load shellcode into a new process
go post-exploitation redteam shellcode windows
Last synced: 01 Aug 2024
https://github.com/ytisf/pyexfil
A Python Package for Data Exfiltration
bgp data-exfiltration dns ftp http-cookies icmp packets pop3 post-exploitation python qrcode quic regin slack steganography
Last synced: 01 Aug 2024
https://github.com/ytisf/PyExfil
A Python Package for Data Exfiltration
bgp data-exfiltration dns ftp http-cookies icmp packets pop3 post-exploitation python qrcode quic regin slack steganography
Last synced: 01 Aug 2024
https://github.com/blackarrowsec/mssqlproxy
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
lateral-movement mssql post-exploitation proxy security-tool
Last synced: 28 Sep 2024
https://github.com/PaulNorman01/Forensia
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
anti-forensics evasion forensics post-exploitation redteam
Last synced: 03 Aug 2024
https://github.com/redcode-labs/Bashark
Bash post exploitation toolkit
bash post-exploitation post-exploitation-toolkit
Last synced: 01 Aug 2024
https://github.com/adrianvollmer/powerhub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
pentest post-exploitation powershell python remote-admin-tool
Last synced: 01 Aug 2024
https://github.com/AdrianVollmer/PowerHub
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
pentest post-exploitation powershell python remote-admin-tool
Last synced: 31 Jul 2024
https://github.com/screetsec/vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited
Last synced: 01 Aug 2024
https://github.com/screetsec/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited
Last synced: 06 Aug 2024
https://github.com/Screetsec/Vegile
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited
Last synced: 31 Jul 2024
https://github.com/b23r0/Heroinn
A cross platform C2/post-exploitation framework.
c2 pentest-tool post-exploitation rat remote-control trojan-rat
Last synced: 01 Aug 2024
https://github.com/emilyanncr/Windows-Post-Exploitation
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
command-line ethical-hacking exploiting-windows hacking hacking-tool post-exploitation
Last synced: 01 Aug 2024
https://github.com/sevagas/swap_digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
dfir forensics hacking post-exploitation security
Last synced: 02 Aug 2024
https://github.com/enkomio/AlanFramework
A C2 post-exploitation framework
c2 hacking hacking-tool post-exploitation red-team red-teaming security security-tool
Last synced: 04 Aug 2024
https://github.com/operatorequals/covertutils
A framework for Backdoor development!
agent communication-channel crypto encryption handler payload pentesting post-exploitation python rce reverse-shell shell steganography stego stream
Last synced: 31 Jul 2024
https://github.com/redteamoperations/pivotsuite
Network Pivoting Toolkit
enterprise hacking pentest-tool pivoting post-exploitation redteam redteam-infrastructure
Last synced: 01 Aug 2024
https://github.com/zMarch/Orc
Orc is a post-exploitation framework for Linux written in Bash
Last synced: 20 Aug 2024
https://github.com/zmarch/orc
Orc is a post-exploitation framework for Linux written in Bash
Last synced: 01 Aug 2024
https://github.com/cyberark/Evasor
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
bypass-applocker-policies full-automated penetration-testing-tools post-exploitation
Last synced: 04 Aug 2024
https://github.com/panagiks/RSPET
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
backdoor hacking pentesting plug-ins post-exploitation reverse-shell security security-audit udp-flood udp-spoof
Last synced: 04 Aug 2024
https://github.com/S1ckB0y1337/TokenPlayer
Manipulating and Abusing Windows Access Tokens.
lateral-movement pentest-tool post-exploitation tokens uac-bypass windows windows-internals windows-privilege-escalation windows-security
Last synced: 04 Aug 2024
https://github.com/chrispetrou/hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
ethical-hacking flask hacking http-reverse https https-server injection metasploit oscp penetration-testing pentesting post-exploitation red-team reverse-shell security shellcode-injection shellcode-injector tls tls-support tornado
Last synced: 03 Aug 2024
https://github.com/chrispetrou/HRShell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
ethical-hacking flask hacking http-reverse https https-server injection metasploit oscp penetration-testing pentesting post-exploitation red-team reverse-shell security shellcode-injection shellcode-injector tls tls-support tornado
Last synced: 01 Aug 2024
https://github.com/luke-goddard/enumy
Linux post exploitation privilege escalation enumeration
automation linux-enumeration oscp oscp-tools post-exploitation privilage-escalation vulnerability-scanners
Last synced: 04 Aug 2024
https://github.com/Ziconius/FudgeC2
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
c2 command-and-control cybersecurity implant offensive-security post-exploitation powershell purpleteam python3 readteaming redteam security security-tools
Last synced: 31 Jul 2024
https://github.com/vonahisec/leprechaun
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
post-exploitation privilege-escalation
Last synced: 01 Aug 2024
https://github.com/m8sec/enumdb
Relational database brute force and post exploitation tool for MySQL and MSSQL
brute-force database enumeration mssql mysql pentest-tool pentesting post-exploitation python3
Last synced: 28 Sep 2024
https://github.com/r00t-3xp10it/redpill
Assist reverse tcp shells in post-exploration tasks
c2-options cmdlet post-exploitation redteam reverse-tcp-shells
Last synced: 04 Aug 2024
https://github.com/0x09AL/DNS-Persist
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
pentesting post-exploitation redteam
Last synced: 30 Jul 2024
https://github.com/Geeoon/DNS-Tunnel-Keylogger
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
cybersecurity dns dns-exfiltration dns-tunneling keylogger post-exploitation
Last synced: 26 Sep 2024
https://github.com/Gr1mmie/AtlasC2
C# C2 Framework centered around Stage 1 operations
command-and-control post-exploitation red-teaming stage-1
Last synced: 04 Aug 2024
https://github.com/r00t-3xp10it/msf-auxiliarys
My collection of metasploit auxiliary post-modules
metasploit msf-auxiliarys post-exploitation
Last synced: 03 Aug 2024
https://github.com/00xkhaled/Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
data-mining macos pentesting post-exploitation remote-administrator-tool
Last synced: 03 Sep 2024
https://github.com/lexfo/rpc2socks
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
post-exploitation rpc smb socks windows
Last synced: 04 Aug 2024
https://github.com/blackbotsecurity/Atomic-Red-Team-Intelligence-C2
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
csharp dotnet mitre-attack offensive-security post-exploitation powershell-scripts purple-team purpleteam python3 red-teams redteam
Last synced: 04 Aug 2024
https://github.com/go-outside-labs/sec-pentesting-toolkit
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
botnets cryptography ctf forensics gray-hacker-resources hacking infosec iocs linux malwares network penetration-testing pentesting post-exploitation reverse-engineering rubber-ducky steganography vulnerabilities wargame web-security
Last synced: 31 Jul 2024
https://github.com/The-Z-Labs/bof-launcher
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
adversarial-attacks beacon beaconobjectfile bof cobalt cobalt-strike coff cybersecurity elf execution in-memory penetration-testing-tools post-exploitation red-team security-tools
Last synced: 01 Aug 2024
https://github.com/Chainski/ForceAdmin
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
autoit3 autoit3-script batchfile blueteam-tools exploit forceadmin hacking malware payload pentesting post-exploitation powershell powershell-payload privilege-escalation redteam-tools uac windows windows-exploitation
Last synced: 02 Aug 2024
https://github.com/deadbits/Intersect-2.5
Post-Exploitation Framework
penetration-testing post-exploitation python python-framework
Last synced: 31 Jul 2024
https://github.com/mez-0/DecryptRDCManager
.NET 4.0 Remote Desktop Manager Password Gatherer
execute-assembly net-framework post-exploitation
Last synced: 04 Aug 2024
https://github.com/incredibleindishell/LDAP-credentials-collector-backdoor-generator
This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
backdoorweb information-security ldap-exploitation post-exploitation
Last synced: 04 Aug 2024
https://github.com/ekiojp/dfex
DNS File EXfiltration
dns exfiltration file post-exploitation
Last synced: 04 Aug 2024
https://github.com/Andromeda1957/LinPwn
Interactive Post Exploitation Tool
enumeration linux-security post-exploitation privilege-escalation security security-tools
Last synced: 01 Aug 2024
https://github.com/sneakerhax/C2PE
C2 and Post Exploitation Code
c2 golang offensivesecurity pentesting post-exploitation python3 redteam security
Last synced: 04 Aug 2024
https://github.com/NullArray/SBD
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
bash bash-script post-exploitation shell shellscript
Last synced: 04 Aug 2024
https://github.com/powerexploit/Powerexploit
Post-Exploitation :sunglasses: module for Penetration Tester and Hackers.
pentesting post-exploitation powershell-module scanning vulnerability-assessment
Last synced: 04 Aug 2024
https://github.com/daymorelah/packetanalyzerandsniffer
A simple python module that implements a packet sniffer and analyser. It sniffs and analyses TCP, UDP, IPV4 and IPV6 traffic.
information-gathering penetration-testing post-exploitation
Last synced: 04 Aug 2024
https://github.com/crimsonlabs-io/Cache
An arms cache for security consultants, red teams and penetration testers. Sometimes for defenders too.
blue-team hacking penetration-test post-exploitation red-team security-consultants security-tools
Last synced: 04 Aug 2024
https://github.com/byt3n33dl3/c2kepexec
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution
backdoor c2 malware osx post-exploitation python3 rat reverse-shell shellcode shellexecute windows
Last synced: 01 Oct 2024
https://github.com/prvvv/chromeforensics
Different code samples for Chrome browser analysis & post exploitation
chrome chrome-devtools exploit forensic forensics forensics-tools hacking password post-exploitation
Last synced: 29 Sep 2024
https://github.com/marten4n6/evilosx
An evil RAT (Remote Administration Tool) for macOS / OS X.
backdoor mac macos macosx osx pentesting post-exploitation python python3 rat reverse-shell
Last synced: 30 Jul 2024