Post-Exploitation Tools

267 tools
EtherGhost
EtherGhost
Open Source Post-Exploitation

新一代Webshell管理器,兼容蚁剑与冰蝎的PHP webshell

EVA
EVA
Free Post-Exploitation

EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextu…

Evil-WinRM
Evil-WinRM
Open Source Kali Exploitation Post-Exploitation

Full-featured WinRM shell for hacking and penetration testing. Supports pass-the-hash, file upload/download, in-memory script loading, and P…

evil-winrm
evil-winrm
Open Source Kali Post-Exploitation

The ultimate WinRM shell for hacking/pentesting

evil-winrm-py
evil-winrm-py
Open Source Post-Exploitation

Execute commands interactively on remote Windows machines using the WinRM protocol (just faster)

eviltree
eviltree
Open Source Post-Exploitation

A python3 remake of the classic "tree" command with the additional feature of searching for user provided keywords/regex in files, highlight…

exploit
exploit
Open Source Post-Exploitation Reconnaissance

This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!

exposelab
exposelab
Open Source Exploitation Post-Exploitation

This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.

ExtractBitlockerKeys
ExtractBitlockerKeys
Open Source Post-Exploitation

A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.

favicorn
favicorn
Open Source Exploitation Post-Exploitation

All-sources tool to search websites by favicons

flashingestor
flashingestor
Open Source Exploitation Post-Exploitation

A TUI for Active Directory collection.

ForceAdmin
ForceAdmin
Open Source Exploitation Post-Exploitation

Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠

fsociety
fsociety
Open Source Exploitation Post-Exploitation

fsociety Hacking Tools Pack – A Penetration Testing Framework

Fuck-Windows-Security
Fuck-Windows-Security
Open Source Post-Exploitation

A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualizati…

GateSentinel
GateSentinel
Free Exploitation Post-Exploitation

GateSentinel 是一个现代化的 C2 (Command and Control) 框架,专为安全研究和渗透测试设计。该项目采用 Go 语言开发服务端,C 语言开发客户端,提供了强大的远程控制和管理功能。

GC2-sheet
GC2-sheet
Open Source Post-Exploitation

GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsoft S…

Gecko
Gecko
Open Source Post-Exploitation

Gecko Backdoor is a most powerful web php backdoor.

Ghost
Ghost
Open Source Kali Exploitation Post-Exploitation

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

goexec
goexec
Open Source Post-Exploitation

Windows remote execution multitool

GoldenDMSA
GoldenDMSA
Free Post-Exploitation

This tool exploits Golden DMSA attack against delegated Managed Service Accounts.

goMalleable
goMalleable
Open Source Exploitation Post-Exploitation

🔎🪲 Malleable C2 profiles parser and assembler written in golang

GoodHound
GoodHound
Free Exploitation Post-Exploitation

Uses Sharphound, Bloodhound and Neo4j to produce an actionable list of attack paths for targeted remediation.

gorsh
gorsh
Free Exploitation Post-Exploitation

A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface

gpoParser
gpoParser
Free Exploitation Post-Exploitation

gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory enviro…