SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
-
Updated
Jun 21, 2024 - Python
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
WIP Post-exploitation framework tailored for hypervisors.
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Command-line tool to identify useragents that bypasses proxy restrictions
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Bash post exploitation toolkit
Adversary Emulation Framework
General Purpouse Telegram Bot. Can act as a RAT, a Ransomware, a post exploitation tool, or just as a core to your custom bot.
Auxiliar a Coleta de Informação.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
PyPowRST(short for "Pyhton Powered ReverseShell Tool")
Koadic C3 COM Command & Control - JScript RAT
Add a description, image, and links to the post-exploitation-toolkit topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation-toolkit topic, visit your repo's landing page and select "manage topics."