• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Bashark - Bash Post Exploitation Toolkit

Status
Not open for further replies.

dEEpEst

☣☣ In The Depths ☣☣
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
32
Reaction score
45,552
Points
1,813
Credits
55,350
‎7 Years of Service‎
 
56%
Bashark




This link is hidden for visitors. Please Log in or register now.


Post exploitation toolkit written in pure Bash

This link is hidden for visitors. Please Log in or register now.
 
This link is hidden for visitors. Please Log in or register now.
 
This link is hidden for visitors. Please Log in or register now.



Table of Contents




Introduction


Bashark aids pentesters and security researchers during the post-exploitation phase of security audits.


Usage


To launch Bashark on compromised host, simply source the bashark.sh script from terminal: $ source bashark.sh Then type help to see Bashark's help menu


Features


  • Single Bash script
  • Lightweight and fast
  • Multi-platform: Unix, OSX, Solaris etc.
  • No external dependencies
  • Immune to heuristic and behavioural analysis
  • Built-in aliases of often used shell commands
  • Extends system shell with post-exploitation oriented functionalities
  • Stealthy, with custom cleanup routine activated on exit
  • Easily extensible (add new commands by creating Bash functions)
  • Full tab completion


Demo


This link is hidden for visitors. Please Log in or register now.



License


This software is under 
This link is hidden for visitors. Please Log in or register now.


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top