Automated Hosting Information Hunting Tool - Windows 主机信息自动化狩猎工具
- Updated
Apr 15, 2025 - C#
Automated Hosting Information Hunting Tool - Windows 主机信息自动化狩猎工具
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement
A list of 350+ free TryHackMe rooms💻 to kick off your cybersecurity learning, organized by topics for easy exploration and practical skill-building !💀💥
A command and control (C2) server
Credentials Checking Framework
One line command and control backdoors for APIs and web applications.
Linux-Based Reverse Shell Builder For Linux Penetration Testers
A post-exploitation tool to decrypt SolarPutty's sessions files
Smart overlay for Cobalt Strike PS function
Pentesting post exploitation tool for slack
Automate the creation of Backdoors and postexplotation activities
Utilidades para facilitarnos el trabajo
This CVE addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access.
A flexible, AI powered C2 framework built with operators in mind
BDsploit (Big Data Exploitation and Post-exploitation Toolkit)
Advanced DLL Hijacking Payload Generator Using Windows Defender Vulnerabilities
A sophisticated, wizard-driven Python exploit tool targeting CVE-2025-53770, a critical (CVSS 9.8) unauthenticated remote code execution (RCE) vulnerability in on-premises Microsoft SharePoint Server (2016, 2019, Subscription Edition)
A collection of hacking tools, resources and references to practice ethical hacking.
Add a description, image, and links to the postexplotation topic page so that developers can more easily learn about it.
To associate your repository with the postexplotation topic, visit your repo's landing page and select "manage topics."