An open-source post-exploitation framework for students, researchers and developers.
-
Updated
May 20, 2024 - Python
An open-source post-exploitation framework for students, researchers and developers.
fsociety Hacking Tools Pack – A Penetration Testing Framework
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
A collection of hacking tools, resources and references to practice ethical hacking.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
A tool to dump the login password from the current linux user
venom - C2 shellcode generator/compiler/handler
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
An evil RAT (Remote Administration Tool) for macOS / OS X.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Linux/Windows post-exploitation framework made by linux user
A cross platform C2/post-exploitation framework.
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."