Exploit Time-Based SQL Injection | Retrieve Database Informations
-
Updated
May 3, 2024 - Python
Exploit Time-Based SQL Injection | Retrieve Database Informations
A reverse shell written in Python
Linux post-exploitation persistance script
Automate the obfuscation process for C# post-exploitation tools.
Windows anti-forensics made easy
Windows RAT w/ antivirus bypass.
Multiplatform, post-exploitation tool to maintain the continuous access to a computer using irc as communication bus and capable of spawning a remote shell.
lowest-common denominator binaries
keylogger python with send email
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Post-Exploitation Toolkit for Splunk 🐒
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
A set of libraries and accompanying tools for post-exploitation, written in Golang.
Spotify C2 in golang
EternalHush - new free advanced open-source c2 framework
Roadmap for cybersecurity beginners.
This is a malware manipulation environment for OpenAI's gym
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."