Category: Post Exploitation

Auto-Root-Exploit: Auto Root Exploit Tool

Auto-Root-Exploit Auto Root Exploit Tool Author : Nilotpal Biswas Facebook : https://www.facebook.com/nilotpal.biswas.73 Twitter : https://twitter.com/nilotpalhacker Available Exploits for:- linux kernel 2.6 linux kernel 2.6.0 linux kernel 2.6.10 linux kernel 2.6.11 linux kernel...

Get VNC session using Metasploit

On this post, I’m going to guide you how to get VNS session using Metasploit. Virtual Network Computing In computing, Virtual Network Computing (VNC) is a graphical desktop sharing system that uses the Remote Frame...

[Tips] Using mimikataz on penetration testing

mimikatz is a tool I’ve made to learn C and make somes experiments with Windows security. It’s now well known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. mimikatz can also...

swap_digger

swap_digger: automate Linux swap analysis

swap_digger swap_digger is a bash script used to automate Linux swap analysis for post-exploitation or forensic purpose. It automates swap extraction and searches for Linux user credentials, Web form credentials,...

powersap: Powershell SAP assessment tool

PowerSAP PowerSAP is a simple powershell re-implementation of popular & effective techniques of all public tools such as Bizploit, Metasploit auxiliary modules, or python scripts available on the Internet. This re-implementation does...

Windows Event Log Killer

Phant0m v2.0 releases: Windows Event Log Killer

Phant0m Svchost is essential in the implementation of so-called shared service processes, where a number of services can share a process in order to reduce resource consumption. Grouping multiple services...