Category: Post Exploitation

AutoRDPwn

AutoRDPwn: The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim’s desktop without his consent, and even control it on...

FallofSudo

FallofSudo: Pwning sudo rules

FallofSudo This has been developed to aid in the exploitation of Linux sudo rules. However, it should also be used in learning how to secure your sudo rules! Download git clone https://github.com/Critical-Start/FallofSudo.git Usage This script...

WMImplant

WMImplant: RAT powershell Tool

WMImplant A PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as the C2 channel for issuing commands and receiving results. It will likely require local administrator permissions on...

Bashark

Bashark: Bash post exploitation toolkit

Bashark Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioral...