Category: Post Exploitation

maalik

maalik v2.4.3 releases: Network Pivoting and Post Exploitation Framework for Windows

Maalik Network Pivoting and Post Exploitation Framework. Features Console Features Desktop notification on new sessions. Kill Online sessions easily. Build Maalik Client, Fhdawn easily. Configurable values in settings.ini Root shell. Multithreaded, Get multiple sessions. Maalik...

shad0w: post exploitation framework

shad0w SHAD0W is a modular C2 framework designed to successfully operate in mature environments. It will use a range of methods to evade EDR and AV while allowing the operator to continue using tooling...

Impost3r

Impost3r: A linux password thief

Impost3r Impost3r is a tool that aims to steal many kinds of Linux passwords(including ssh,su,sudo) written by C Attackers can use Impost3r to make a trap to steal the legal user’s passwords XD This...

sitrep

sitrep: Extensible, configurable host triage

SitRep Extensible, configurable host triage. Purpose SitRep is intended to provide a lightweight, extensible host triage alternative. Checks are loaded dynamically at runtime from stand-alone files. This allows operators to quickly modify existing checks,...

DCOM Vulnerability scanner

DVS: DCOM Vulnerability scanner

D(COM) V(ulnerability) S(canner) AKA Devious swiss army knife – Lateral movement using DCOM Objects Did you ever wonder how you can move laterally through internal networks? Interact with remote machines without alerting EDRs? Assuming...

SNIcat

SNIcat: performs data exfiltration

SNIcat SNIcat is a proof of concept tool that performs data exfiltration, utilizing a covert channel method via. Server Name Indication, a TLS Client Hello Extension. The tool consists of an agent which resides on the compromised internal...

C_Shot

C_Shot: offensive security tool written in C

C_Shot C_Shot is an offensive security tool written in C which is designed to download, inject, and execute shellcode in memory. Depending on the arguments used, this can be accomplished via two different methods:...