Category: Post Exploitation

AWS post-exploitation tool

EC2StepShell: AWS post-exploitation tool

EC2StepShell EC2StepShell is an AWS post-exploitation tool for getting high privileges to reverse shells in public or private EC2 instances. It works by sending commands to EC2 instances using ssm:SendCommand and then retrieves the...

Windows privilege escalation tool

GodPotato: Windows privilege escalation tool

GodPotato Based on the history of Potato privilege escalation for 6 years, from the beginning of RottenPotato to the end of JuicyPotatoNG, I discovered a new technology by researching DCOM, which enables privilege escalation...

Handle hijacking

Handle-Ripper: Windows handle hijacker

Handle-Ripper Handle hijacking is a technique used in Windows operating systems to gain access to resources and resources of a system without permission. It is a type of privilege escalation attack in which a...

Anti Forensics Tool

Forensia: Anti Forensics Tool For Red Teamers

Forensia Anti Forensics Tool For Red Teamers, Used For Erasing Some Footprints In The Post Exploitation Phase. Reduces Payload Burnout And Increases Detection Countdown. Can Be Used To Test The capabilities of Your Incident...