Credentials Checking Framework
-
Updated
Feb 8, 2023 - Python
Credentials Checking Framework
One line command and control backdoors for APIs and web applications.
A command and control (C2) server
Automate the creation of Backdoors and postexplotation activities
Utilidades para facilitarnos el trabajo
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
A Postexploitation HTTP Command and Control Framework
Python3 script to discover diferent hosts on a /24 Network
Post Exploitation Framework via Exif Data in images
A simple Post Exploitation C2 Tool
PyPowRST(short for "Pyhton Powered ReverseShell Tool")
AccessWiz - A Remote Access Trojan (RAT)
Add a description, image, and links to the postexplotation topic page so that developers can more easily learn about it.
To associate your repository with the postexplotation topic, visit your repo's landing page and select "manage topics."