Post-Exploitation Tools

267 tools
mimipenguin
mimipenguin
Free Post-Exploitation

A tool to dump the login password from the current linux user

Modern-Red-Team-Infrastructure
Modern-Red-Team-Infrastructure
Free Evasion Exploitation

A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.

moukthar
moukthar
Open Source Post-Exploitation

Android remote administration tool

MsfMania
MsfMania
Open Source Evasion Post-Exploitation

MsfMania Payload Execution Logs …

MY-CRTP-Notes
MY-CRTP-Notes
Open Source Exploitation Post-Exploitation

This repository contains my preparation notes for CRTP and Red Teaming, focused on Active Directory attacks and defenses.

Mythic-OSEP-CheatSheet
Mythic-OSEP-CheatSheet
Open Source Post-Exploitation

This repo contains my full cheatsheet and code I used to pass the OSEP using Mythic C2. I've try to keep everything simple and direct and I'…

Ncat
Ncat
Open Source Kali Post-Exploitation Scanning & Enumeration

Feature-packed reimplementation of Netcat from the Nmap project. Adds SSL/TLS support, connection brokering, and scripting capabilities.

Nebula
Nebula
Free Post-Exploitation Reconnaissance

Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still wo…

NebulaC2
NebulaC2
Free Post-Exploitation

Neo4LDAP
Neo4LDAP
Open Source Exploitation Post-Exploitation

Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis …

Netcat (nc)
Netcat (nc)
Open Source Kali Post-Exploitation Scanning & Enumeration

The "Swiss army knife" of networking. Reads and writes data across network connections using TCP/UDP. Used for port scanning, banner grabbin…

NetExec
NetExec
Open Source Exploitation Post-Exploitation

🚩 This is the open source repository of NetExec maintained by a community of passionate people

Netexec (nxc)
Netexec (nxc)
Open Source Kali Exploitation Post-Exploitation

The maintained fork and successor to CrackMapExec. Network service exploitation Swiss army knife for Active Directory pentesting. Supports S…

Nimbo-C2
Nimbo-C2
Open Source Exploitation Post-Exploitation

Nimbo-C2 is yet another (simple and lightweight) C2 framework

Nishang
Nishang
Open Source Kali Exploitation Post-Exploitation

Framework and collection of PowerShell scripts and payloads for offensive security and post-exploitation. Includes reverse shells, privilege…

nodepass
nodepass
Open Source Exploitation Post-Exploitation

A secure, efficient TCP/UDP tunneling solution that delivers fast, reliable access across network restrictions using pre-established TCP/QUI…

nPassword
nPassword
Open Source Exploitation Post-Exploitation

A Windows AD Password Manager for ATTACKER(Redteamer/Pentester).

odat
odat
Free Post-Exploitation

ODAT: Oracle Database Attacking Tool

OnionC2
OnionC2
Free Exploitation Post-Exploitation

C2 writen in Rust & Go powered by Tor network.

OnlyShell
OnlyShell
Open Source Exploitation Post-Exploitation

A powerful Go-based multi-shell handler for managing multiple reverse shell connections simultaneously with features like shell type detecti…

Open-Source-Threat-Intel-Feeds
Open-Source-Threat-Intel-Feeds
Open Source Post-Exploitation Social Engineering

This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple ty…

Owlyshield
Owlyshield
Free Forensics Post-Exploitation

Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).

PandaLoader
PandaLoader
Open Source Evasion Exploitation

A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.

PassTester
PassTester
Open Source Post-Exploitation

Identify the accounts most vulnerable to dictionary attacks