Post-Exploitation Tools

267 tools
PayloadsAllTheThings
PayloadsAllTheThings
Open Source Exploitation Post-Exploitation

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

PEASS-ng (WinPEAS / LinPEAS)
PEASS-ng (WinPEAS / LinPEAS)
Open Source Kali Post-Exploitation

Privilege Escalation Awesome Scripts Suite. Automatically enumerates Windows (WinPEAS) and Linux/Mac (LinPEAS) systems for privilege escalat…

Penetration-Testing-Cheat-Sheet
Penetration-Testing-Cheat-Sheet
Open Source Password Attacks Post-Exploitation

An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration te…

Pentest-Everything
Pentest-Everything
Free Post-Exploitation

A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics als…

pentest-pivoting
pentest-pivoting
Free Post-Exploitation

A compact guide to network pivoting for penetration testings / CTF challenges.

Pentest-Resources-Cheat-Sheets
Pentest-Resources-Cheat-Sheets
Free Exploitation Post-Exploitation

This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-ups, …

Pentest-Service-Enumeration
Pentest-Service-Enumeration
Open Source Post-Exploitation

Suggests programs to run against services found during the enumeration phase of a Pentest

periodic-table-offensive-security
periodic-table-offensive-security
Open Source Exploitation Post-Exploitation

A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF versio…

PersistenceSniper
PersistenceSniper
Free Forensics Post-Exploitation

Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows ma…

phpsploit
phpsploit
Open Source Exploitation Post-Exploitation

Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor

pivot-rs
pivot-rs
Open Source Exploitation Post-Exploitation

A lightweight port-forwarding and socks proxy tool written in Rust 🦀

PlumHound
PlumHound
Open Source Exploitation Post-Exploitation

Bloodhound Reporting for Blue and Purple Teams

PoshC2
PoshC2
Open Source Exploitation Post-Exploitation

A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.

PowerDodder
PowerDodder
Open Source Exploitation Post-Exploitation

Traditional persistence methods (e.g., Registry Run keys, scheduled tasks) are often monitored or flagged by EDRs and blue teams. PowerDodde…

PowerHub
PowerHub
Open Source Post-Exploitation

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

Powershellisfun
Powershellisfun
Open Source Post-Exploitation

Repository with the scripts that I have used in my blogs on https://powershellisfun.com. If you like these, please sponsor this project usin…

PowerSploit
PowerSploit
Open Source Kali Post-Exploitation

Collection of PowerShell modules for post-exploitation. Includes PowerView for AD recon, PowerUp for privilege escalation, Invoke-Mimikatz, …

PrivescCheck
PrivescCheck
Open Source Post-Exploitation

Privilege Escalation Enumeration Script for Windows

Privilege-Escalation
Privilege-Escalation
Free Post-Exploitation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

profilehound
profilehound
Open Source Exploitation Post-Exploitation

ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by …

Proxychains
Proxychains
Open Source Kali Post-Exploitation

Forces any TCP connection made by a given application through proxy servers like SOCKS4, SOCKS5, or HTTP. Essential for pivoting through com…

prtstrike
prtstrike
Open Source Post-Exploitation

PRTSTRIKE 是一个轻便、小巧、快捷的轻量化 C&C 框架,由 Go 编写,最快可 1 分钟部署完成。 | 指标 | 数值 | |------|------| | C2 Server 编译大小 | ~30 MB | | Implant 编译大小 (Windows x64) …

PsMapExec
PsMapExec
Open Source Post-Exploitation

Dominate Active Directory with PowerShell.

PSRansom
PSRansom
Open Source Post-Exploitation

PowerShell Ransomware Simulator with C2 Server