post-exploitation
Here are 13 public repositories matching this topic...
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
-
Updated
May 16, 2017 - C#
Demo for spawning processes under a specified parent PID.
-
Updated
May 24, 2017 - C#
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
-
Updated
Jan 29, 2020 - C#
.NET 4.0 Remote Desktop Manager Password Gatherer
-
Updated
Sep 29, 2020 - C#
-
Updated
Dec 19, 2020 - C#
C# C2 Framework centered around Stage 1 operations
-
Updated
Apr 4, 2022 - C#
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements using DNS tunneling.
-
Updated
May 15, 2022 - C#
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
-
Updated
Apr 8, 2023 - C#
Windows anti-forensics made easy
-
Updated
Mar 6, 2024 - C#
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
-
Updated
May 10, 2024 - C#
Improve this page
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."