SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
-
Updated
Jul 25, 2024 - Shell
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
venom - C2 shellcode generator/compiler/handler
Bash post exploitation toolkit
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Orc is a post-exploitation framework for Linux written in Bash
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
A shell script that automatically performs a series of *NIX enumeration tasks.
Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.
mOrc is a post-exploitation framework for macOS written in Bash
Escalation Servers and Scripts for Priv Escalation
⚔️ 📦 An Ubuntu 18.04 box for Mythic C2 framework development
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Rogue.sh is an automated Bash script for Linux systems that performs Nmap scans, sets up Metasploit, exploits vulnerabilities, downloads sensitive files, gathers credentials, and executes post-exploitation tasks, providing a comprehensive overview of a target system's vulnerabilities and security measures.
「🖥️」Covenant C2 Installer for RPI 4
sudoers file in which there are all the possible privilege escalation using sudo privilege with gtfo bins
🌐 DZGEN - Works with Kali Linux tools 🌐
A powerful, automated script that installs and configures 300+ offensive security tools across 20+ categories (recon, exploitation, post-exploitation, red teaming, etc.). Features parallel installations, GitHub API integration, dependency management, and isolated Python environments for clean tool setups.
A collection of simple scripts to achieve persistence quick in cloud environments without generating too much noise.
Linux post-exploitation persistance script
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."