Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
-
Updated
May 31, 2024 - Python
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Instagram Auto Exploit Tool && Bypass Two Step Verification
Search for interesting data in network shares or drives
Linux/Windows post-exploitation framework made by linux user
An open-source post-exploitation framework for students, researchers and developers.
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Simple Powershell Http shell With WEB UI
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
A Simple Reverse Shell TCP End-To-End Encrypted Made In C#
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A Python Package for Data Exfiltration
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Exploit Time-Based SQL Injection | Retrieve Database Informations
A user-friendly Web-UI tool for Mimikatz
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."