post-exploitation
Here are 213 public repositories matching this topic...
Hacks credit card PAN numbers by using partial Hashes, and a list of random PAN [pins]
-
Updated
Oct 31, 2016 - PowerShell
-
Updated
Feb 11, 2017 - Ruby
Post-Exploitation Framework
-
Updated
Feb 16, 2017 - Python
This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.
-
Updated
Apr 3, 2017 - PHP
A basic AIX enumeration guide for penetration testers/red teamers
-
Updated
Apr 11, 2017
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
-
Updated
May 16, 2017 - C#
Demo for spawning processes under a specified parent PID.
-
Updated
May 24, 2017 - C#
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
-
Updated
Jun 12, 2017 - Shell
Python port scanner and host discovery tool, using only the python standard library
-
Updated
Jul 21, 2017 - Python
This is a malware manipulation environment for OpenAI's gym
-
Updated
Jul 31, 2017 - Python
Koadic C3 COM Command & Control - JScript RAT
-
Updated
Sep 26, 2017 - Python
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
-
Updated
Oct 31, 2017 - Python
A simple information gathering script used during the post-exploitation phase during a pentest.
-
Updated
Nov 1, 2017 - Python
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
-
Updated
Nov 20, 2017 - C++
🌐 DZGEN - Works with Kali Linux tools 🌐
-
Updated
Dec 31, 2017 - Shell
A wide collection of tools for specific exploitations...
-
Updated
Jan 4, 2018 - Python
Improve this page
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."