Active Filters:
📂 Post-Exploitation
Clear all filters

  Post-Exploitation

34 tools found

Showing 29-34 of 34 tool(s) in the category "Post-Exploitation"
Page 2 of 2
Empire
Post-Exploitation

Empire

Modular post-exploitation and adversary emulation framework with remote access support.

pongoOS
Post-Exploitation

pongoOS

Pre-boot environment for Apple boards built on checkra1n, useful in post-exploitation.

emp3r0r
Post-Exploitation

emp3r0r

Advanced post-exploitation framework for Linux/Windows with integrated C2 capabilities.

Texto-ASCII
Post-Exploitation

Texto-ASCII

Script for converting text or files to and from ASCII, ideal for data encoding, obfuscation analysis, and cybersecurity operations.

Texto-CobBarras
Post-Exploitation

Texto-CobBarras

Script for quick text-to-barcode and barcode-to-text conversion, ideal for logistics, cybersecurity, or data obfuscation and exfiltration tasks.

GTFOBins
Post-Exploitation

GTFOBins

Unix binaries list abused to escape restrictions or escalate privileges in misconfigured systems.

GPT - RedTeam.Blue