New pentesting Framework
-
Updated
Dec 6, 2023 - Shell
New pentesting Framework
A simple Post Exploitation C2 Tool
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
Add a description, image, and links to the post-exploit topic page so that developers can more easily learn about it.
To associate your repository with the post-exploit topic, visit your repo's landing page and select "manage topics."