Statistics for topic post-exploitation
RepositoryStats tracks 582,597 Github repositories, of these 83 are tagged with the post-exploitation topic. The most common primary language for repositories using this topic is Python (39).
Stargazers over time for topic post-exploitation
Most starred repositories for topic post-exploitation (view more)
Trending repositories for topic post-exploitation (view more)
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A collection of hacking tools, resources and references to practice ethical hacking.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
:computer::warning: A curated collection of awesome malware, botnets, and other post-exploitation tools.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A collection of hacking tools, resources and references to practice ethical hacking.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
XENA is Corss-Platform Software for Cyber-Security Automation, Adversary Simulations, and Red Team Operations. XENA strives to be fully integrated security penetration testing framework. It is equipp...
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A collection of hacking tools, resources and references to practice ethical hacking.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
A collection of hacking tools, resources and references to practice ethical hacking.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments