post-exploitation

There are 276 repositories under post-exploitation topic.

  • sundowndev/hacker-roadmap

    A collection of hacking tools, resources and references to practice ethical hacking.

  • GTFOBins/GTFOBins.github.io

    GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

    Language:HTML12.3k152541.5k
  • Manisso/fsociety

    fsociety Hacking Tools Pack – A Penetration Testing Framework

    Language:Python11.6k5961722.1k
  • malwaredllc/byob

    An open-source post-exploitation framework for students, researchers and developers.

    Language:Python9.3k3245102.2k
  • n1nj4sec/pupy

    Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C

    Language:Python8.9k46401.8k
  • Ne0nd0g/merlin

    Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

    Language:Go5.4k136107844
  • Viper

    FunnyWolf/Viper

    Adversary simulation and Red teaming platform with AI

  • huntergregal/mimipenguin

    A tool to dump the login password from the current linux user

    Language:C4k14731648
  • nicocha30/ligolo-ng

    An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

    Language:Go4k28133393
  • Ghost

    EntySec/Ghost

    Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

    Language:Python3.2k1963021k
  • phpsploit

    nil0x42/phpsploit

    Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor

    Language:Python2.4k10498468
  • Marten4n6/EvilOSX

    An evil RAT (Remote Administration Tool) for macOS / OS X.

    Language:Python2.4k109117491
  • SILENTTRINITY

    byt3bl33d3r/SILENTTRINITY

    An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

    Language:Boo2.3k10689420
  • MegaManSec/SSH-Snake

    SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

    Language:Shell2.3k2516218
  • r00t-3xp10it/venom

    venom - C2 shellcode generator/compiler/handler

    Language:Shell1.9k9195606
  • jm33-m0/emp3r0r

    Linux/Windows post-exploitation framework made by linux user

    Language:Go1.6k34131274
  • cyberark/kubesploit

    Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

    Language:Go1.2k262118
  • BlackMamba

    loseys/BlackMamba

    C2/post-exploitation framework

    Language:Python1.1k646178
  • ToRat

    lu4p/ToRat

    ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication

    Language:Go1k3846197
  • AdrianVollmer/PowerHub

    A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

    Language:PowerShell8201852128
  • PyExfil

    ytisf/PyExfil

    A Python Package for Data Exfiltration

    Language:Python7994317144
  • PaulNorman01/Forensia

    Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.

    Language:C++77816477
  • brimstone/go-shellcode

    Load shellcode into a new process

    Language:Go772189125
  • blackarrowsec/mssqlproxy

    mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse

    Language:Python753182116
  • redcode-labs/Bashark

    Bash post exploitation toolkit

    Language:Shell743336106
  • screetsec/Vegile

    This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

    Language:Shell736392165
  • b23r0/Heroinn

    A cross platform C2/post-exploitation framework.

    Language:Rust6972911218
  • adbwebkit

    jxroot/adbwebkit

    ADB For Hackers (:

    Language:JavaScript6812412118
  • EtherGhost

    Marven11/EtherGhost

    新一代Webshell管理器,兼容蚁剑与冰蝎的PHP webshell

    Language:Python65571548
  • SeaShell

    EntySec/SeaShell

    SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.

    Language:Python64175583
  • Frissi0n/GTFONow

    Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.

    Language:Python6279774
  • shennina

    mazen160/shennina

    Automating Host Exploitation with AI

    Language:Python5491514105
  • emilyanncr/Windows-Post-Exploitation

    Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

  • sevagas/swap_digger

    swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.

    Language:Shell52628590
  • lepotekil/MsfMania

    Python AV Evasion Tools

    Language:Python521121579
  • enkomio/AlanFramework

    A C2 post-exploitation framework

    Language:Assembly48514876