venom - C2 shellcode generator/compiler/handler
-
Updated
Dec 9, 2023 - Shell
venom - C2 shellcode generator/compiler/handler
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Bash post exploitation toolkit
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Orc is a post-exploitation framework for Linux written in Bash
Escalation Servers and Scripts for Priv Escalation
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
A shell script that automatically performs a series of *NIX enumeration tasks.
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
mOrc is a post-exploitation framework for macOS written in Bash
「🖥️」Covenant C2 Installer for RPI 4
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
Linux post-exploitation persistance script
A collection of simple scripts to achieve persistence quick in cloud environments without generating too much noise.
⚔️ 📦 An Ubuntu 18.04 box for Mythic C2 framework development
🌐 DZGEN - Works with Kali Linux tools 🌐
sudoers file in which there are all the possible privilege escalation using sudo privilege with gtfo bins
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."