Category: Post Exploitation


Bashark: Bash post exploitation toolkit

Bashark Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioral...


Inveigh v1.4 releases: Windows PowerShell LLMNR/mDNS/NBNS spoofer/man-in-the-middle tool

Inveigh is a PowerShell LLMNR/mDNS/NBNS spoofer and man-in-the-middle tool designed to assist penetration testers/red teamers that find themselves limited to a Windows system. Included In PowerShell Empire – PS>Attack – p0wnedShell – PowerUpSQL –


MIDA-Multitool: system enumeration, vulnerability identification and privilege escalation

MIDA-Multitool – Bash script purposed for system enumeration, vulnerability identification, and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper and is in many regards RootHelpers successor. Besides functionality from these two previous...


ibombshell: Dynamic Remote Shell

ibombshell – Dynamic Remote Shell ibombshell is a tool written in Powershell that allows you to have a prompt at any time with post-exploitation functionalities (and in some cases exploitation). It is a shell that...