Statistics for topic post-exploitation
RepositoryStats tracks 625,469 Github repositories, of these 88 are tagged with the post-exploitation topic. The most common primary language for repositories using this topic is Python (40).
Stargazers over time for topic post-exploitation
Most starred repositories for topic post-exploitation (view more)
Trending repositories for topic post-exploitation (view more)
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A collection of hacking tools, resources and references to practice ethical hacking.
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
A collection of hacking tools, resources and references to practice ethical hacking.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
The most advanced GUI Frontend RAT for MacOS and OSX distro using XPC's Exploitation.
A collection of hacking tools, resources and references to practice ethical hacking.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.