Post-Exploitation Tools

267 tools
Azure-AD-Password-Checker
Azure-AD-Password-Checker
Free Exploitation Post-Exploitation

In an Azure AD environment, it's possible to determine whether a user has Multi-Factor Authentication (MFA) disabled without requiring any s…

Bashark
Bashark
Open Source Post-Exploitation

Bash post exploitation toolkit

BeaconatorC2
BeaconatorC2
Open Source Evasion Post-Exploitation

BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catalog …

black-hat-rust
black-hat-rust
Open Source Exploitation Post-Exploitation

Applied offensive security with Rust - https://kerkour.com/black-hat-rust

blocklist-ipsets
blocklist-ipsets
Free Post-Exploitation

ipsets dynamically updated with firehol's update-ipsets.sh script

bof-launcher
bof-launcher
Free Exploitation Post-Exploitation

bof-launcher - a library for loading, executing and in-memory masking BOFs on Windows (x64, x86) and Linux (x64, x86, aarch64, arm). Ready t…

BotnetC2
BotnetC2
Free Post-Exploitation

THANKS YOU FOR CODE | credit NixWasHere/NixC2

BounceBack
BounceBack
Open Source Exploitation Post-Exploitation

↕️🤫 Stealth redirector for your red team operation security

byob
byob
Open Source Post-Exploitation

An open-source post-exploitation framework for students, researchers and developers.

C2_RedTeam_CheatSheets
C2_RedTeam_CheatSheets
Free Post-Exploitation

Useful C2 techniques and cheat sheets learned from engagements

c2compiler
c2compiler
Open Source Post-Exploitation

This is the C2 compiler written in C2 itself.

C2TeamServer
C2TeamServer
Open Source Post-Exploitation

TeamServer and Client of Exploration Command and Control Framework

CDK
CDK
Open Source Exploitation Post-Exploitation

📦 Make security testing of K8s, Docker, and Containerd easier.

Certified-Red-Team-Professional-CRTP---Notes
Certified-Red-Team-Professional-CRTP---Notes
Open Source Exploitation Post-Exploitation

Certified Red Team Professional (CRTP) - Notes

chainreactor
chainreactor
Free Exploitation Post-Exploitation

ChainReactor is a research project that leverages AI planning to discover exploitation chains for privilege escalation on Unix systems. The …

cheatsheets
cheatsheets
Free Exploitation Post-Exploitation

Collection of knowledge about information security

Chisel
Chisel
Open Source Kali Exploitation Post-Exploitation

Fast TCP/UDP tunnel transported over HTTP and secured via SSH. Used for port forwarding and pivoting through restrictive firewalls. Single b…

claude-code-backdoor
claude-code-backdoor
Free Post-Exploitation Social Engineering

Backdooring Claude Code via hooks in settings.json. Authorized use only!

Cobalt-Strike-Ultimate-Arsenal
Cobalt-Strike-Ultimate-Arsenal
Free Evasion Post-Exploitation

Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and pen…

CobaltStrike-KunKun
CobaltStrike-KunKun
Free Post-Exploitation

坤坤CS 基于CobaltStrike cat 4.5二开项目 添加反沙箱、反测绘。集成常用后渗透插件,开箱即用

cochise
cochise
Open Source Post-Exploitation

Autonomous Assumed Breach Penetration-Testing Active Directory Networks

Coercer
Coercer
Open Source Post-Exploitation Scanning & Enumeration

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.

COM-Hunter
COM-Hunter
Open Source Exploitation Post-Exploitation

Commander
Commander
Open Source Exploitation Post-Exploitation

A command and control (C2) server