A tool to dump the login password from the current linux user
-
Updated
May 17, 2023 - C
8000
A tool to dump the login password from the current linux user
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Linux post exploitation privilege escalation enumeration
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
PostShell - Post Exploitation Bind/Backconnect Shell
The most advanced GUI Frontend RAT for MacOS and OSX distro using XPC's Exploitation.
Steal user's password when running sudo for post-exploitation purposes
A modular pentesting framework implemented in C
EternalHush - new free advanced open-source c2 framework
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
C2 extensible for post-explotation and remote control
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool.
Quickly and easily dump Sticky Notes content on Windows 10
Load shellcode into a new process, optionally under a false name.
A tool used to clear Windows Event Logs without invoking wevtutil
Auxiliar a Coleta de Informação.
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."