Linpwn

Interactive Post Exploitation Tool
Alternatives To Linpwn
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Hacker Roadmap12,086
5 months ago3mit
A collection of hacking tools, resources and references to practice ethical hacking.
Ssh Snake874
2 months agoagpl-3.0Shell
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Kubesploit501
3 years agon,ullgpl-3.0Go
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Alanframework435
2 months ago3otherAssembly
A C2 post-exploitation framework
Gtfonow414
2 months ago3mitPython
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Swap_digger376
3 years ago1gpl-3.0Shell
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Rspet251
6 years ago1May 07, 201711mitPython
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hrshell242
3 years ago1gpl-3.0Python
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Fudgec2236
a year ago3gpl-3.0Python
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Hatsploit236
3 months agomitPython
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Alternatives To Linpwn
Select To Compare


Alternative Project Comparisons
Popular Post Exploitation Projects
Popular Security Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Security
Security Tools
Privilege Escalation
Post Exploitation