Projects in Awesome Lists tagged with postexplotation
A curated list of projects in awesome lists tagged with postexplotation .
https://github.com/voidsec/solarputtydecrypt
A post-exploitation tool to decrypt SolarPutty's sessions files
decrypt exploit forensics postexploit postexplotation sessions solarputty
Last synced: 09 Apr 2025
https://github.com/carlospolop/kaosk-backdoors
Automate the creation of Backdoors and postexplotation activities
attacker backdoors backdoors-created listener metasploit metasploit-payloads msfvenom postexplotation unicorn
Last synced: 24 Mar 2025
https://github.com/nof0rte/slack-slurp
Pentesting post exploitation tool for slack
go golang pentest-tool pentesting postexplotation slack
Last synced: 28 Apr 2025
https://github.com/altoid0/gom-jabbar
Personal collection of Red team scripts
initial-access offensive-scripts offensive-security persistence postexplotation powershell powershell-scripts redteam redteam-tools redteaming
Last synced: 28 Dec 2025
https://github.com/krishpranav/postexploit
A simple Post Exploitation C2 Tool
c c-plus-plus exploit-development exploitation exploitation-framework exploits golang hacking linux macos post post-exploit postexplotation python python-security security security-tools vscode vulnerability windows
Last synced: 12 Oct 2025
https://github.com/stavinski/clipsnoop
Snoop on the windows clipboard for specific remote processes
clipboard cybersecurity golang hooking postexplotation
Last synced: 11 Mar 2025
https://github.com/thenewattacker64/file-finder
FindFilesFast is a C++ program that searches for files with a specified extension in a directory tree using multithreading It is designed to be a post-exploitation tool for locating files on a system that you have permission to access
Last synced: 21 Feb 2025
https://github.com/exfil0/cve-2025-53770
A sophisticated, wizard-driven Python exploit tool targeting CVE-2025-53770, a critical (CVSS 9.8) unauthenticated remote code execution (RCE) vulnerability in on-premises Microsoft SharePoint Server (2016, 2019, Subscription Edition)
attack cve-2025-53770 exploit poc postexplotation python sharepoint
Last synced: 23 Oct 2025
https://github.com/oldkingcone/tucker
Like the chimera of Nina Tucker, PHP based local enumeration of windows systems.
av-bypass edr-bypass local postexplotation reconnaissance
Last synced: 23 Nov 2025