Post-Exploitation Tools

267 tools
pumpbin
pumpbin
Open Source Evasion Exploitation

🎃 PumpBin is an Implant Generation Platform.

pwncat
pwncat
Open Source Post-Exploitation Scanning & Enumeration

Fancy reverse and bind shell handler

PyADRecon
PyADRecon
Open Source Post-Exploitation Reconnaissance

Python3 implementation of ADRecon with support for NTLM and Kerberos authentication querying LDAP. Generates individual CSV files and a sing…

PyADRecon-ADWS
PyADRecon-ADWS
Open Source Post-Exploitation Reconnaissance

An implementation of PyADRecon using ADWS instead of LDAP. Generates individual CSV files and a single XSLX + HTML report about your AD doma…

PyExfil
PyExfil
Open Source Post-Exploitation Reconnaissance

A Python Package for Data Exfiltration

pyFindUncommonShares
pyFindUncommonShares
Open Source Post-Exploitation

FindUncommonShares is a Python script allowing to quickly find uncommon shares in vast Windows Domains, and filter by READ or WRITE accesses…

PyIris
PyIris
Open Source Post-Exploitation

PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.

pyLDAPWordlistHarvester
pyLDAPWordlistHarvester
Open Source Password Attacks Post-Exploitation

A tool to generate a wordlist from the information present in LDAP, in order to crack passwords of domain accounts.

pywerview
pywerview
Open Source Post-Exploitation Reconnaissance

A (partial) Python rewriting of PowerSploit's PowerView

RamiGPT
RamiGPT
Open Source Post-Exploitation Scanning & Enumeration

Autonomous Privilege Escalation using AI

rast
rast
Open Source Post-Exploitation

A cross platform C2 server written in Rust!

Ravage
Ravage
Open Source Exploitation Post-Exploitation

Ravage Framework - Powershell weaponized for offensive security professionals.

RDWAtool
RDWAtool
Open Source Post-Exploitation Reconnaissance

A python script to extract information from a Microsoft Remote Desktop Web Access (RDWA) application

realm
realm
Open Source Exploitation Post-Exploitation

Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.

Red-Team-Rising
Red-Team-Rising
Free Exploitation Forensics

Notes for red teamers - from cloud to Active Directory to many things in between.

Red-Team-Tools
Red-Team-Tools
Free Exploitation Post-Exploitation

Repo containing cracked red teaming tools.

redpill
redpill
Free Exploitation Post-Exploitation

Assist reverse tcp shells in post-exploration tasks

RedTeamTools
RedTeamTools
Open Source Exploitation Post-Exploitation

记录自己编写、修改的部分工具

ReHTTP
ReHTTP
Open Source Kali Exploitation Post-Exploitation

Simple Powershell Http shell With WEB UI

RemoteAdminTool
RemoteAdminTool
Open Source Post-Exploitation

A CLI Remote Administration Tool for administrating a network over a TCP connection. Extremely simple and modular containing over 30 command…

RingReaper
RingReaper
Open Source Evasion Post-Exploitation

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

rita
rita
Open Source Forensics Post-Exploitation

Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.

RITM
RITM
Open Source Post-Exploitation

This is a Python implementation of the man-in-the-middle attack described by Charlie Clark (@exploitph) in his post, New Attack Paths? AS Re…

road-to-hacking
road-to-hacking
Free Kali Exploitation Post-Exploitation

¿Quieres empezar en el mundo hacking? En esta revista te enseño a instalar Kali Linux desde cero y a manipular herramientas esenciales en el…