Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
-
Updated
Oct 25, 2024 - Python
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Bash post exploitation toolkit
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
WIP Post-exploitation framework tailored for hypervisors.
Command-line tool to identify useragents that bypasses proxy restrictions
General Purpouse Telegram Bot. Can act as a RAT, a Ransomware, a post exploitation tool, or just as a core to your custom bot.
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
PyPowRST(short for "Pyhton Powered ReverseShell Tool")
Koadic C3 COM Command & Control - JScript RAT
Adversary Emulation Framework
Auxiliar a Coleta de Informação.
Add a description, image, and links to the post-exploitation-toolkit topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation-toolkit topic, visit your repo's landing page and select "manage topics."