Post-Exploitation Tools

267 tools
GTFOBins
GTFOBins
Open Source Post-Exploitation

Curated list of Unix binaries that can be used to bypass local security restrictions. Shows how to abuse sudo, SUID, capabilities, and file …

gtfobins-cli
gtfobins-cli
Open Source Exploitation Post-Exploitation

Search for Unix binaries that can be exploited to bypass system security restrictions.

GTFOBins.github.io
GTFOBins.github.io
Open Source Exploitation Post-Exploitation

GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.

GTFONow
GTFONow
Open Source Exploitation Post-Exploitation

Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.

hashcathelper
hashcathelper
Open Source Password Attacks Post-Exploitation

Run hashcathelper -h for help. The program is structured in subcommands. See hashcathelper -h for more information.

HatSploit
HatSploit
Open Source Exploitation Post-Exploitation

Modular penetration testing platform that enables you to write, test, and execute exploit code.

Havoc C2
Havoc C2
Open Source Exploitation Post-Exploitation

Modern C2 framework designed for red teams. Features a sleek GUI, Demon agent with evasion techniques, team server for collaboration, and ex…

hermit
hermit
Open Source Exploitation Post-Exploitation

A command and control framework.

htb-writeups
htb-writeups
Open Source Exploitation Post-Exploitation

The most comprehensive Hack The Box writeup collection - 500+ machines, 400+ challenges, interactive knowledge graph, skill trees, attack pa…

httpworker
httpworker
Free Exploitation Post-Exploitation

A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For education…

hunting-rules
hunting-rules
Open Source Post-Exploitation

Suricata rules for network anomaly detection

IllusiveFog
IllusiveFog
Open Source Post-Exploitation

Windows Administrator level Implant.

Impacket
Impacket
Open Source Kali Exploitation Post-Exploitation

Collection of Python classes for working with network protocols. Includes tools for SMB, MSRPC, LDAP, Kerberos, and more. Used for Pass-the-…

Impacket-secretsdump
Impacket-secretsdump
Open Source Kali Password Attacks Post-Exploitation

Dumps secrets remotely using a variety of techniques including DCSync (without running code on DC), VSS, and SAM dump. Part of the Impacket …

Infosec_Reference
Infosec_Reference
Open Source Exploitation Forensics

An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.

Invoke-ADEnum
Invoke-ADEnum
Open Source Post-Exploitation

Active Directory Auditing and Enumeration

Invoke-RDPThief
Invoke-RDPThief
Free Post-Exploitation

Inject RDPThief into memory with PowerShell.

Invoke-SMBRemoting
Invoke-SMBRemoting
Open Source Post-Exploitation

Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement

K8tools
K8tools
Open Source Exploitation Password Attacks

K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Ex…

kaldi-active-grammar
kaldi-active-grammar
Open Source Post-Exploitation

Python Kaldi speech recognition with grammars that can be set active/inactive dynamically at decode-time

kernel-exploits
kernel-exploits
Free Exploitation Post-Exploitation

My proof-of-concept exploits for the Linux kernel

Kitsune
Kitsune
Open Source Post-Exploitation

kizagan
kizagan
Open Source Post-Exploitation

KIZAGAN is a RAT,c2 command&control tool.It allows you to build executables and control infected machines.

kosty
kosty
Open Source Post-Exploitation

Scan 30+ AWS services. Find cost waste. Detect security gaps. Map your attack surface. One command.