There are 132 repositories under post-exploitation topic.
A collection of hacking tools, resources and references to practice ethical hacking.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
An open-source post-exploitation framework for students, researchers and developers.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
A tool to dump the login password from the current linux user
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
venom - C2 shellcode generator/compiler/handler
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
C2/post-exploitation framework
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
A C2 post-exploitation framework
[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
A framework for Backdoor development!