Post-Exploitation Tools

267 tools
ThreatFox-IOC-IPs
ThreatFox-IOC-IPs
Open Source Post-Exploitation Reconnaissance

Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.

ThreatIntelligence
ThreatIntelligence
Free Exploitation Post-Exploitation

This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals…

TibaneC2
TibaneC2
Open Source Exploitation Post-Exploitation

A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).

toxnet
toxnet
Free Forensics Post-Exploitation

Decentralised P2P botnet using toxcore.

Trawler
Trawler
Open Source Forensics Post-Exploitation

PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.

TrickDump
TrickDump
Free Post-Exploitation

Dump lsass using only NTAPI functions creating 3 JSON and 1 ZIP file... and generate the MiniDump file later!

TryHackMe-Roadmap
TryHackMe-Roadmap
Free Forensics Post-Exploitation

a list of 350+ Free TryHackMe rooms to start learning cybersecurity with THM

TryHackMe-Roadmap
TryHackMe-Roadmap
Free Forensics Post-Exploitation

Hello, aspiring hackers! 🕵️‍♂️ Here’s a list of 500+ Free TryHackMe rooms to kickstart your cybersecurity journey. These rooms are absolutel…

TryHackMeRoadmap
TryHackMeRoadmap
Free Forensics Post-Exploitation

A list of 350+ free TryHackMe roomsđź’» to kick off your cybersecurity learning, organized by topics for easy exploration and practical skill-b…

unix-privesc-check
unix-privesc-check
Open Source Kali Post-Exploitation

Shell script to check for simple privilege escalation vectors on Unix systems. Checks file permissions, sudo rights, SUID binaries, cron job…

Venoma
Venoma
Free Post-Exploitation

Yet another C++ Cobalt Strike beacon dropper with Compile-Time API hashing and custom indirect syscalls execution

venus
venus
Open Source Post-Exploitation

A Visual Studio Code Extension agent for Mythic C2

Villain
Villain
Free Exploitation Post-Exploitation

Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality wi…

Viper
Viper
Free Exploitation Post-Exploitation

Adversary simulation and Red teaming platform with AI

VMkatz
VMkatz
Open Source Post-Exploitation

Extract Windows credentials directly from VM memory snapshots and virtual disks

WADComs.github.io
WADComs.github.io
Open Source Exploitation Post-Exploitation

WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used again…

WebcamBOF
WebcamBOF
Open Source Exploitation Post-Exploitation

Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options

Willie-C2
Willie-C2
Free Evasion Post-Exploitation

A Golang implant that uses Discord as a C2 team server

windows-coerced-authentication-methods
windows-coerced-authentication-methods
Free Post-Exploitation

A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with v…

Windows-Local-Privilege-Escalation-Cookbook
Windows-Local-Privilege-Escalation-Cookbook
Open Source Post-Exploitation

Windows Local Privilege Escalation Cookbook

Windows-Post-Exploitation
Windows-Post-Exploitation
Free Post-Exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contribution…

WindowSpy
WindowSpy
Open Source Exploitation Post-Exploitation

WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.

WinPwn
WinPwn
Open Source Exploitation Post-Exploitation

Automation for internal Windows Penetrationtest / AD-Security

Writeups
Writeups
Free Exploitation Post-Exploitation

This repository contains writeups for various CTFs I've participated in (Including Hack The Box).