Post-Exploitation Tools

267 tools
RTLC2
RTLC2
Free Exploitation Post-Exploitation

Advanced Command and Control Framework for Authorized Red Team Operations

Rubeus
Rubeus
Open Source Exploitation Post-Exploitation

C# toolset for raw Kerberos interaction and abuse. Performs Kerberoasting, AS-REP Roasting, Pass-the-Ticket, Golden/Silver Ticket attacks, t…

RustHound
RustHound
Open Source Exploitation Post-Exploitation

Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀

RustPotato
RustPotato
Open Source Exploitation Post-Exploitation

A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI …

SeaShell
SeaShell
Open Source Exploitation Post-Exploitation

SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive in…

SharpCovertTube
SharpCovertTube
Free Exploitation Post-Exploitation

Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube

SharpGmailC2
SharpGmailC2
Open Source Exploitation Post-Exploitation

Our Friendly Gmail will act as Server and implant will exfiltrate data via smtp and will read commands from C2 (Gmail) via imap protocol

SharpHound
SharpHound
Open Source Post-Exploitation Reconnaissance

C# ingestor for BloodHound. Collects Active Directory data including group memberships, ACLs, trust relationships, sessions, and local admin…

Sinister
Sinister
Open Source Kali Post-Exploitation

Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info

SkyFall-Pack
SkyFall-Pack
Open Source Exploitation Post-Exploitation

Your Skyfall Infrastructure Pack

Sliver
Sliver
Open Source Exploitation Post-Exploitation

Open-source C2 framework from BishopFox. Supports mTLS, WireGuard, HTTP/S, and DNS C2 channels. Features implant generation, pivoting, BOF s…

sliver
sliver
Open Source Kali Exploitation Post-Exploitation

Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform secu…

SNEK_Blue-War-Hammer
SNEK_Blue-War-Hammer
Free Exploitation Post-Exploitation

Blue Hammer by Nightmare-Eclipse Vulnerability Documentation & Reimplementation.

sopa
sopa
Open Source Exploitation Post-Exploitation

A practical client for ADWS in Golang.

spydithreatintel
spydithreatintel
Open Source Post-Exploitation Reconnaissance

Spydi ThreatIntel Feed is built on open-source threat intelligence, community-maintained blocklists, and public security research.

sshimpanzee
sshimpanzee
Open Source Exploitation Post-Exploitation

SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)

Starkiller
Starkiller
Open Source Post-Exploitation

Starkiller is a Frontend for PowerShell Empire.

SteppingStones
SteppingStones
Open Source Exploitation Post-Exploitation

A hub for Red Team activity to aid in record keeping, situational awareness and reporting. Stepping Stones provides a web based UI for the t…

SUDO_KILLER
SUDO_KILLER
Open Source Exploitation Post-Exploitation

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific m…

SUID3NUM
SUID3NUM
Open Source Exploitation Post-Exploitation

A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binari…

swarmer
swarmer
Open Source Exploitation Post-Exploitation

A tool to convert windows registry export files into windows hive files that can be used to replace NTUSER.MAN

system3
system3
Open Source Post-Exploitation

system3, Samsung's worst nightmare for a 3rd time!

tactical-exploitation
tactical-exploitation
Open Source Password Attacks Post-Exploitation

Modern tactical exploitation toolkit.

TelecordC2
TelecordC2
Open Source Post-Exploitation

Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷