Active Filters:
📂 Post-Exploitation
Clear all filters

  Post-Exploitation

29 tools found

Showing 1-28 of 29 tool(s) in the category "Post-Exploitation"
Page 1 of 2
wwwtree
Post-Exploitation

wwwtree

Tool to locate, host, and transfer exploits/scripts to victim machines during privilege escalation.

Post-Exploitation

Adaptix Framework

Extensible post-exploitation and adversary emulation framework for penetration testers.

pongoOS
Post-Exploitation

pongoOS

Pre-boot environment for Apple boards built on checkra1n, useful in post-exploitation.

emp3r0r
Post-Exploitation

emp3r0r

Advanced post-exploitation framework for Linux/Windows with integrated C2 capabilities.

SysWhispers2
Post-Exploitation

SysWhispers2

Generates direct syscall headers/ASM for evasion and privilege escalation in post-exploitation.

LaZagne
Post-Exploitation

LaZagne

Extracts locally stored passwords from popular software on the compromised system.

Rubeus
Post-Exploitation

Rubeus

C# toolset for Kerberos interaction and abuse in Windows environments.

Reverse Shell Generator
Post-Exploitation

Reverse Shell Generator

Generates reverse shell commands in various languages for easy C2 connections.

Nishang
Post-Exploitation

Nishang

Nishang is a PowerShell toolkit for post-exploitation and offensive security testing.

PSTools
Post-Exploitation

PSTools

Toolkit for local and remote Windows management via command line; supports process and system control.

ScriptSentry
Post-Exploitation

ScriptSentry

Detects misconfigured logon scripts that could be leveraged for privilege escalation.

NetExec
Post-Exploitation

NetExec

Post-exploitation tool for enumeration and attacks in internal Windows networks.

Empire
Post-Exploitation

Empire

Modular post-exploitation and adversary emulation framework with remote access support.

HAITI
Post-Exploitation

HAITI

Automatically identifies hash types via CLI tool or library interface.

Transformations
Post-Exploitation

Transformations

Analyzes input transformations to help craft more effective payloads.

Impacket
Post-Exploitation

Impacket

Python library to manipulate network protocols like SMB and MSRPC for attacks.

GASE
Post-Exploitation

GASE

Extracts and decodes Google Authenticator secrets for post-access use.

Supernova
Post-Exploitation

Supernova

Supernova is an open-source tool that empowers users to securely encrypt and/or obfuscate their raw shellcode.

ExtractBitlockerKeys
Post-Exploitation

ExtractBitlockerKeys

A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.

CyberChef
Post-Exploitation

CyberChef

It’s the Cyber Swiss Army Knife. There are 463+ useful operations in CyberChef for anyone working on anything vaguely Internet-related, whether you just want to convert a timestamp to a different format, decompress gzipped data, create a SHA3 hash, or parse an X.509 certificate to find out who issued it. A simple, intuitive web app for analysing and decoding data without having to deal with complex tools or programming languages.

Texto-Binário
Post-Exploitation

Texto-Binário

Script with a menu interface to convert text or files to and from binary, ideal for encoding, obfuscation, and data exfiltration in cybersecurity.

Texto-Morse
Post-Exploitation

Texto-Morse

Script for converting text to and from Morse code, useful for data encoding, obfuscation, and exfiltration in cybersecurity scenarios.

Texto-Braille
Post-Exploitation

Texto-Braille

Script for converting text to and from Braille, ideal for accessibility, data obfuscation, and cybersecurity-related encoding tasks.

Texto-ASCII
Post-Exploitation

Texto-ASCII

Script for converting text or files to and from ASCII, ideal for data encoding, obfuscation analysis, and cybersecurity operations.

Texto-Emojis
Post-Exploitation

Texto-Emojis

Script that converts text to emojis and back, ideal for fun, creative encoding, or exploring obfuscation in cybersecurity contexts.

Texto-Todos
Post-Exploitation

Texto-Todos

Robust script for converting text into formats like ASCII, binary, Morse, Braille, emojis, barcodes, and more perfect for cybersecurity, obfuscation, and data exfiltration projects.

Texto-CobBarras
Post-Exploitation

Texto-CobBarras

Script for quick text-to-barcode and barcode-to-text conversion, ideal for logistics, cybersecurity, or data obfuscation and exfiltration tasks.

Texto-Base64
Post-Exploitation

Texto-Base64

Script with a simple interface to encode/decode text and files in Base64, useful for data handling in cybersecurity, obfuscation, and exfiltration scenarios.

GPT - RedTeam.Blue