Jyang Post Exploitation Framework
NOTE: This was made for educational purposes and won't be maintained. It's here as a sort of educational archive for me.
Version 2.1.0
A threat emulation framework made completely for educational purposes and not shared publicly. It still needs work anyways, any monkey can detect most of these if they are competent, its mostly for learning how to hunt and how hackers think and will take time to become more advanced.
SPECIAL THANKS
Unamanged Powershell - https://github.com/leechristensen/UnmanagedPowerShell
Mimikatz - https://github.com/gentilkiwi/mimikatz