Post-Exploitation Tools

267 tools
KryptonC2
KryptonC2
Free Post-Exploitation

Krypton C2 is a simple botnet source. Credits Source Code: NixWasHere

kylebot
kylebot
Open Source Post-Exploitation

Kylebot | This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !

ldap2json
ldap2json
Free Post-Exploitation

The ldap2json script allows you to extract the whole LDAP content of a Windows domain into a JSON file.

ldapconsole
ldapconsole
Open Source Post-Exploitation

The ldapconsole script allows you to perform custom LDAP requests to a Windows domain.

ligolo-iwa
ligolo-iwa
Open Source Post-Exploitation

A Ligolo-ng JavaScript agent working inside Chrome & Chromium-based browsers by leveraging Isolated Web Applications.

ligolo-mp
ligolo-mp
Open Source Exploitation Post-Exploitation

Please visit the Wiki for up-to-date information

Ligolo-ng
Ligolo-ng
Open Source Exploitation Post-Exploitation

Advanced tunneling/pivoting tool that creates a VPN-like tunnel from the agent to the operator without SOCKS proxies. Enables direct routing…

ligolo-ng
ligolo-ng
Open Source Kali Exploitation Post-Exploitation

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

LinEnum
LinEnum
Open Source Post-Exploitation

Scripted local Linux enumeration and privilege escalation checks. Collects system information, user data, SUID/SGID binaries, sudo configura…

linux-kernel-exploitation
linux-kernel-exploitation
Free Exploitation Post-Exploitation

A collection of links related to Linux kernel security and exploitation

linWinPwn
linWinPwn
Open Source Exploitation Post-Exploitation

linWinPwn is a bash script that streamlines the use of a number of Active Directory tools

LOLBAS
LOLBAS
Open Source Evasion Post-Exploitation

Living Off The Land Binaries And Scripts — documents Windows native binaries that can be abused for execution, download, bypass, and persist…

lolc2.github.io
lolc2.github.io
Free Exploitation Post-Exploitation

lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection

LummaC2-Stealer
LummaC2-Stealer
Free Forensics Post-Exploitation

LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis

malefic
malefic
Free Post-Exploitation

IoM implant, C2 Framework and Infrastructure

malice-network
malice-network
Open Source Post-Exploitation

Next Generation C2 Framework, IoM-server/client

malware-persistence
malware-persistence
Free Forensics Post-Exploitation

Collection of malware persistence and hunting information. Be a persistent persistence hunter!

Maverick
Maverick
Free Evasion Exploitation

Adaptix C2 agent using Crystal Palace PIC linker and PICO module system

merlin
merlin
Open Source Post-Exploitation

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

metarget
metarget
Open Source Post-Exploitation

Metarget is a framework providing automatic constructions of vulnerable infrastructures.

Metasploit Framework
Metasploit Framework
Open Source Kali Exploitation Post-Exploitation

The world's most widely used penetration testing framework. Provides hundreds of exploit modules, payloads, encoders, and post-exploitation …

Meterpreter
Meterpreter
Open Source Kali Post-Exploitation

Metasploit's advanced, dynamically extensible payload. Runs entirely in memory, supports migration, keylogging, screenshot capture, pivoting…

Microsoft-eventlog-mindmap
Microsoft-eventlog-mindmap
Open Source Forensics Post-Exploitation

Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...

Mimikatz
Mimikatz
Open Source Kali Password Attacks Post-Exploitation

Post-exploitation tool to extract plaintexts passwords, hashes, PIN codes, and Kerberos tickets from memory. Also performs Pass-the-Hash, Pa…