A command and control (C2) server
-
Updated
May 9, 2024 - Python
A command and control (C2) server
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
One line command and control backdoors for APIs and web applications.
Pentesting post exploitation tool for slack
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
A Postexploitation HTTP Command and Control Framework
AccessWiz - A Remote Access Trojan (RAT)
Utilidades para facilitarnos el trabajo
Havoc: A modern and malleable post-exploitation C2 command-and-control Framework.
FindFilesFast is a C++ program that searches for files with a specified extension in a directory tree using multithreading It is designed to be a post-exploitation tool for locating files on a system that you have permission to access
Post Exploitation Framework via Exif Data in images
Credentials Checking Framework
Snoop on the windows clipboard for specific remote processes
A post-exploitation tool to decrypt SolarPutty's sessions files
A collection of hacking tools, resources and references to practice ethical hacking.
Automate the creation of Backdoors and postexplotation activities
Empire C2 plugins for automatic persistence on agent check-in
Python3 script to discover diferent hosts on a /24 Network
Linux-Based Reverse Shell Builder For Linux Penetration Testers
A simple Post Exploitation C2 Tool
Add a description, image, and links to the postexplotation topic page so that developers can more easily learn about it.
To associate your repository with the postexplotation topic, visit your repo's landing page and select "manage topics."