[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
-
Updated
Jun 12, 2017 - Shell
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
🌐 DZGEN - Works with Kali Linux tools 🌐
Escalation Servers and Scripts for Priv Escalation
Orc is a post-exploitation framework for Linux written in Bash
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
A shell script that automatically performs a series of *NIX enumeration tasks.
sudoers file in which there are all the possible privilege escalation using sudo privilege with gtfo bins
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
⚔️ 📦 An Ubuntu 18.04 box for Mythic C2 framework development
「🖥️」Covenant C2 Installer for RPI 4
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
mOrc is a post-exploitation framework for macOS written in Bash
Bash post exploitation toolkit
Linux post-exploitation persistance script
venom - C2 shellcode generator/compiler/handler
A collection of simple scripts to achieve persistence quick in cloud environments without generating too much noise.
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."