A simple tool to conceal your commands and their arguments from process monitors.
-
Updated
Mar 9, 2024 - C
A simple tool to conceal your commands and their arguments from process monitors.
Auxiliar a Coleta de Informação.
A tool used to clear Windows Event Logs without invoking wevtutil
Load shellcode into a new process, optionally under a false name.
EternalHush - new free advanced open-source c2 framework
C2 extensible for post-explotation and remote control
Quickly and easily dump Sticky Notes content on Windows 10
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
A modular pentesting framework implemented in C
Steal user's password when running sudo for post-exploitation purposes
PostShell - Post Exploitation Bind/Backconnect Shell
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Linux post exploitation privilege escalation enumeration
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
A tool to dump the login password from the current linux user
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."