A tool to dump the login password from the current linux user
-
Updated
May 17, 2023 - C
A tool to dump the login password from the current linux user
OffensivePH - use old Process Hacker driver to bypass several user-mode access controls
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Linux post exploitation privilege escalation enumeration
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options
PostShell - Post Exploitation Bind/Backconnect Shell
The most advanced GUI Frontend RAT for MacOS and OSX distro using XPC's Exploitation.
Steal user's password when running sudo for post-exploitation purposes
EternalHush - new free advanced open-source c2 framework
A modular pentesting framework implemented in C
Stealthy Windows keylogger written in C which uses a traditional approach to logging keystrokes (Does not utilise WinAPI hooks)
C2 extensible for post-explotation and remote control
C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool.
Modular C2 loader featuring dynamic function encryption, in-memory payload support, and a covert DoH command channel, configurable via a Python builder and a Node.js web panel.
Quickly and easily dump Sticky Notes content on Windows 10
Load shellcode into a new process, optionally under a false name.
A tool used to clear Windows Event Logs without invoking wevtutil
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."