SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET...
Post Exploitation
kernelpop kernelpop is a framework for performing automated kernel vulnerability enumeration and exploitation on the following operating...
aclpwn.py Aclpwn.py is a tool that interacts with BloodHound to identify and exploit ACL based privilege escalation paths. It...
NetRipper – this is a fairly recent tool that is positioned for the post-operating system based on...
Nishang Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for...
Freedom Fighting Mode (FFM) FFM is a hacking harness that you can use during the post-exploitation phase...
ADRecon: Active Directory Recon ADRecon is a tool which extracts and combines various artifacts (as highlighted below)...
WMImplant A PowerShell based tool that leverages WMI to both perform actions against targeted machines, but also as...
pspy – unprivileged Linux process snooping pspy is a command-line tool designed to snoop on processes without...
PXEnum Post eXploitation Enumeration script for Linux. Checks Username Hostname Home User ID Groups Kernel Release Version...
Bashark Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash...
LogRM LogRM is a post-exploitation powershell script which it uses windows event logs to gather information about...
ACLight A script for an advanced discovery of Privileged Accounts – includes Shadow Admins. The tool was...
tactical-exploitation I’ve always been a big proponent of a tactical approach to penetration testing that does not...
MIDA-Multitool – Bash script purposed for system enumeration, vulnerability identification, and privilege escalation.MIDA Multitool draws functionality from several...