• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

post-exploitation

  1. dEEpEst

    BC Security - Empire Operations 1 2025

    Empire Operations I Empire Operations I is an introductory hands-on course with the Empire Post Exploitation Framework. In this course, students will learn the basics of using and operating Empire while being introduced to core red team principles and workflows. Constents \---BC Security -...
  2. itsMe

    Empire 5.1.2 - PowerShell & Python post-exploitation agent

    Empire 4.0 is a post-exploitation framework that includes a pure-PowerShell 2.0 Windows agent, and compatibility with Python 2.x/3.x Linux/OS X agents. It is the merger of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptologically-secure communications and...
  3. itsMe

    Empire 5.0.4 - PowerShell & Python post-exploitation agent

    Empire 4.0 is a post-exploitation framework that includes a pure-PowerShell 2.0 Windows agent, and compatibility with Python 2.x/3.x Linux/OS X agents. It is the merger of the previous PowerShell Empire and Python EmPyre projects. The framework offers cryptologically-secure communications and...
  4. itsMe

    pwncat v0.5.3 - post-exploitation platform

    pwncat is a post-exploitation platform. It started out as a wrapper around basic bind and reverse shells and has grown from there. It streamlines common red team operations while staging code from your attacker machine, not the target. pwncat intercepts the raw communication with a remote shell...
  5. itsMe

    StandIn v1.2 - NET35/45 AD post-exploitation toolkit

    StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution to perform resource-based constrained delegation. However, StandIn quickly ballooned to include a number of comfort features. Changelog v1.2 – A number of old and...
  6. itsMe

    Kubesploit: cross-platform post-exploitation HTTP/2 Command & Control server

    Kubesploit Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and built on top of the Merlin project by Russel Van Tuyl (@Ne0nd0g). Our Motivation While researching Docker and Kubernetes, we...
  7. itsMe

    utopia: Linux post-exploitation framework

    Utopia Framework Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation. Why Utopia Framework     Simple and clear UX/UI. Utopia Framework has a...
  8. itsMe

    Phpsploit v3.1 - Stealth post-exploitation framework

    PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. Features     Efficient: More...
  9. itsMe

    ProjectOpal - Stealth Post-Exploitation For Wordpress

    Stealth post-exploitation framework for Wordpress CMS What is it and why was it made? We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like to pass it on to the public!. ProjectOpal or Opal. Is a stealth post exploit framework...
  10. itsMe

    ProjectOpal: Stealth post-exploitation framework for wordpress

    Opal Stealth post-exploitation framework for WordPress CMS What is it and why was it made? We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like to pass it on to the public!. ProjectOpal or Opal. It is a stealth post exploit...
  11. 0x1

    GTFOBins & GTFO

    GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions. The project collects legitimate functions of Unix binaries that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer...
  12. 0x1

    SILENTTRINITY

    SILENTTRINITY An asynchronous post-exploitation agent powered by Python, IronPython, C# and .NET's DLR Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 How it works Notes .NET runtime support The implant needs .NET...
Back
Top