Post-Exploitation Tools

267 tools
A-Red-Teamer-diaries
A-Red-Teamer-diaries
Free Exploitation Post-Exploitation

RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.

Active-Directory-Exploitation-Cheat-Sheet
Active-Directory-Exploitation-Cheat-Sheet
Open Source Exploitation Post-Exploitation

A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

ActiveDirectoryEnumeration
ActiveDirectoryEnumeration
Open Source Post-Exploitation Scanning & Enumeration

Enumerate AD through LDAP with a collection of helpfull scripts being bundled

AD-AssessmentKit
AD-AssessmentKit
Free Post-Exploitation

Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environments. …

ad-privileged-audit
ad-privileged-audit
Free Forensics Post-Exploitation

Provides various Windows Server Active Directory (AD) security-focused reports.

Adalanche
Adalanche
Open Source Post-Exploitation Reconnaissance

Attack Graph Visualizer and Explorer (Active Directory) ...Who's *really* Domain Admin?

adbwebkit
adbwebkit
Open Source Kali Post-Exploitation

 ADB WEBKIT Access ADB On Browser With Awesome UI …

ADFT
ADFT
Open Source Forensics Post-Exploitation

Active Directory Forensic Toolkit : Detect & reconstruct AD attacks from Windows event logs (EVTX)

adscan
adscan
Free Exploitation Post-Exploitation

Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.

ADTimeline
ADTimeline
Open Source Forensics Post-Exploitation

Timeline of Active Directory changes with replication metadata

adwsdomaindump
adwsdomaindump
Open Source Post-Exploitation

Active Directory information dumper via ADWS for evasion purposes.

Amnesiac
Amnesiac
Open Source Exploitation Post-Exploitation

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Director…

AndroidHack_BackDoor
AndroidHack_BackDoor
Free Kali Post-Exploitation

Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the…

Ankou
Ankou
Open Source Exploitation Post-Exploitation

A flexible, AI powered C2 framework built with operators in mind

anonymous-c2
anonymous-c2
Free Kali Post-Exploitation

This is a DDOS tool {denial-of-service} by sending commands to botnet members. Botnet members can be called zombies and the botnet itself ca…

APT38-0day-Stealer
APT38-0day-Stealer
Free Exploitation Post-Exploitation

APT38 Tactic PoC for Stealing 0days from security researchers

Archive
Archive
Open Source Exploitation Post-Exploitation

Hacking Methodology, Cheatsheats, Conceptual-Breakdowns

Atomic-Red-Team-C2
Atomic-Red-Team-C2
Free Exploitation Post-Exploitation

ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilitie…

AutoPtT
AutoPtT
Free Exploitation Post-Exploitation

Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, Pyth…

AutoRedTeam-Orchestrator
AutoRedTeam-Orchestrator
Free Exploitation Post-Exploitation

Enterprise AI Red Team Platform | 企业级AI红队平台 | 132 MCP Tools | Pure Python Engines | SDK+CLI+MCP | Auto-Download sqlmap/nuclei/ffuf | Product…

awesome-cyber
awesome-cyber
Free Exploitation Forensics

A curated list of tools useful within the field of cyber security, for both blue and red team operations.

awesome-malware-persistence
awesome-malware-persistence
Free Forensics Post-Exploitation

A curated list of awesome malware persistence tools and resources.

awesome-privilege-escalation
awesome-privilege-escalation
Free Post-Exploitation

A curated list of awesome privilege escalation

Awesome-Redteam
Awesome-Redteam
Free Exploitation Post-Exploitation

一个攻防知识库。A knowledge base for red teaming and offensive security.