Active Filters:
📂 Post-Exploitation
Clear all filters

  Post-Exploitation

24 tools found

Showing 1-24 of 24 tool(s) in the category "Post-Exploitation"
LaZagne
Post-Exploitation

LaZagne

Extracts locally stored passwords from popular software on the compromised system.

Rubeus
Post-Exploitation

Rubeus

C# toolset for Kerberos interaction and abuse in Windows environments.

Reverse Shell Generator
Post-Exploitation

Reverse Shell Generator

Generates reverse shell commands in various languages for easy C2 connections.

Nishang
Post-Exploitation

Nishang

Nishang is a PowerShell toolkit for post-exploitation and offensive security testing.

PSTools
Post-Exploitation

PSTools

Toolkit for local and remote Windows management via command line; supports process and system control.

ScriptSentry
Post-Exploitation

ScriptSentry

Detects misconfigured logon scripts that could be leveraged for privilege escalation.

NetExec
Post-Exploitation

NetExec

Post-exploitation tool for enumeration and attacks in internal Windows networks.

Empire
Post-Exploitation

Empire

Modular post-exploitation and adversary emulation framework with remote access support.

HAITI
Post-Exploitation

HAITI

Automatically identifies hash types via CLI tool or library interface.

Transformations
Post-Exploitation

Transformations

Analyzes input transformations to help craft more effective payloads.

Impacket
Post-Exploitation

Impacket

Python library to manipulate network protocols like SMB and MSRPC for attacks.

GASE
Post-Exploitation

GASE

Extracts and decodes Google Authenticator secrets for post-access use.

Supernova
Post-Exploitation

Supernova

Supernova is an open-source tool that empowers users to securely encrypt and/or obfuscate their raw shellcode.

ExtractBitlockerKeys
Post-Exploitation

ExtractBitlockerKeys

A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.

CyberChef
Post-Exploitation

CyberChef

It’s the Cyber Swiss Army Knife. There are 463+ useful operations in CyberChef for anyone working on anything vaguely Internet-related, whether you just want to convert a timestamp to a different format, decompress gzipped data, create a SHA3 hash, or parse an X.509 certificate to find out who issued it. A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.

Texto-Binário
Post-Exploitation

Texto-Binário

Script with a menu interface to convert text or files to and from binary, ideal for encoding, obfuscation, and data exfiltration in cybersecurity.

Texto-Morse
Post-Exploitation

Texto-Morse

Script for converting text to and from Morse code, useful for data encoding, obfuscation, and exfiltration in cybersecurity scenarios.

Texto-Braille
Post-Exploitation

Texto-Braille

Script for converting text to and from Braille, ideal for accessibility, data obfuscation, and cybersecurity-related encoding tasks.

Texto-ASCII
Post-Exploitation

Texto-ASCII

Script for converting text or files to and from ASCII, ideal for data encoding, obfuscation analysis, and cybersecurity operations.

Texto-Emojis
Post-Exploitation

Texto-Emojis

Script that converts text to emojis and back, ideal for fun, creative encoding, or exploring obfuscation in cybersecurity contexts.

Texto-Todos
Post-Exploitation

Texto-Todos

Robust script for converting text into formats like ASCII, binary, Morse, Braille, emojis, barcodes, and more perfect for cybersecurity, obfuscation, and data exfiltration projects.

Texto-CobBarras
Post-Exploitation

Texto-CobBarras

Script for quick text-to-barcode and barcode-to-text conversion, ideal for logistics, cybersecurity, or data obfuscation and exfiltration tasks.

Texto-Base64
Post-Exploitation

Texto-Base64

Script with a simple interface to encode/decode text and files in Base64, useful for data handling in cybersecurity, obfuscation, and exfiltration scenarios.

Texto-Hexadecimal
Post-Exploitation

Texto-Hexadecimal

Script that converts text to hex and back, ideal for fun, learning, or exploring basic obfuscation in creative or cybersecurity contexts.

GPT - RedTeam.Blue