Automate the obfuscation process for C# post-exploitation tools.
-
Updated
Oct 16, 2023 - Python
Automate the obfuscation process for C# post-exploitation tools.
keylogger python with send email
A simple post exploitation tool for unix made for learning purposes
Desafio DIO para a produção de um Ransomware
Portable RC4-encrypted Python reverse shell.
Exploit Time-Based SQL Injection | Retrieve Database Informations
Experiments with using mqtt as a C2 mechanism
Koadic C3 COM Command & Control - JScript RAT
A reverse shell written in Python
Open source penetration framework
Windows RAT w/ antivirus bypass.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
A post-exploitation script that sniffs for POST req data and covertly sends it back to the attackers server using TCP SYN ISN
Post-Exploitation Toolkit for Splunk 🐒
A remote acess tool without port forwarding. An Evil Os implementation for windows
This is a malware manipulation environment for OpenAI's gym
Python port scanner and host discovery tool, using only the python standard library
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."