Post-exploitation basically means the phases of operation once a victim's system has been compromised by the attacker.Powerexploit is a pentesting module contains scanning,remoting,post exploitation functionality,designed with the help of powershell scripting and .net functions.
- Dumping hash -- Port Scan
~> import-module -name Powerexploit.psm1
~> Get-command -module Powerexploit
If you want to contribute to this to this module , So You can contribute in following ways: