Awesome Open Source
Awesome Open Source
Combined Topics
post-exploitation
x
Advertising
📦 10
All Projects
Application Programming Interfaces
📦 124
Applications
📦 192
Artificial Intelligence
📦 78
Blockchain
📦 73
Build Tools
📦 113
Cloud Computing
📦 80
Code Quality
📦 28
Collaboration
📦 32
Command Line Interface
📦 49
Community
📦 83
Companies
📦 60
Compilers
📦 63
Computer Science
📦 80
Configuration Management
📦 42
Content Management
📦 175
Control Flow
📦 213
Data Formats
📦 78
Data Processing
📦 276
Data Storage
📦 135
Economics
📦 64
Frameworks
📦 215
Games
📦 129
Graphics
📦 110
Hardware
📦 152
Integrated Development Environments
📦 49
Learning Resources
📦 166
Legal
📦 29
Libraries
📦 129
Lists Of Projects
📦 22
Machine Learning
📦 347
Mapping
📦 64
Marketing
📦 15
Mathematics
📦 55
Media
📦 239
Messaging
📦 98
Networking
📦 315
Operating Systems
📦 89
Operations
📦 121
Package Managers
📦 55
Programming Languages
📦 245
Runtime Environments
📦 100
Science
📦 42
Security
📦 396
Social Media
📦 27
Software Architecture
📦 72
Software Development
📦 72
Software Performance
📦 58
Software Quality
📦 133
Text Editors
📦 49
Text Processing
📦 136
User Interface
📦 330
User Interface Components
📦 514
Version Control
📦 30
Virtualization
📦 71
Web Browsers
📦 42
Web Servers
📦 26
Web User Interface
📦 210
The Top 54 Post Exploitation Open Source Projects
Categories
>
Security
>
Post Exploitation
Hacker Roadmap
⭐
6,601
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Fsociety
⭐
6,593
fsociety Hacking Tools Pack – A Penetration Testing Framework
Pupy
⭐
6,280
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Byob
⭐
6,189
An open-source post-exploitation framework for students, researchers and developers.
Gtfobins.github.io
⭐
4,507
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Merlin
⭐
3,140
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Mimipenguin
⭐
2,960
A tool to dump the login password from the current linux user
Evilosx
⭐
1,663
An evil RAT (Remote Administration Tool) for macOS / OS X.
Silenttrinity
⭐
1,588
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Pentesting_toolkit
⭐
1,268
🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Phpsploit
⭐
1,246
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Ghost
⭐
1,038
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Venom
⭐
917
venom - shellcode generator/compiler/handler (metasploit)
Viper
⭐
712
图形化内网渗透工具
Blackmamba
⭐
620
C2/post-exploitation framework
Bashark
⭐
604
Bash post exploitation toolkit
Pyexfil
⭐
554
A Python Package for Data Exfiltration
Vegile
⭐
486
This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Go Shellcode
⭐
467
Load shellcode into a new process
Emp3r0r
⭐
448
linux post-exploitation framework made by linux user
Mssqlproxy
⭐
440
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Torat
⭐
436
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Sifter
⭐
436
Sifter aims to be a fully loaded Op Centre for Pentesters
Powerhub
⭐
431
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Covertutils
⭐
424
A framework for Backdoor development!
Swap_digger
⭐
360
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Orc
⭐
349
Orc is a post-exploitation framework for Linux written in Bash
Pivotsuite
⭐
333
Network Pivoting Toolkit
Windows Post Exploitation
⭐
297
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Rspet
⭐
252
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Leprechaun
⭐
234
This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.
Enumy
⭐
210
Linux post exploitation privilege escalation enumeration
Hrshell
⭐
195
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Dns Persist
⭐
191
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Fudgec2
⭐
191
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Mouse
⭐
186
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Poet
⭐
185
[unmaintained] Post-exploitation tool
Msf Auxiliarys
⭐
183
My collection of metasploit auxiliary post-modules
Zombieant
⭐
170
Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.
Enumdb
⭐
168
Relational database brute force and post exploitation tool for MySQL and MSSQL
Oscp Pentest Methodologies
⭐
166
备考 OSCP 的各种干货资料/渗透测试干货资料
Herakeylogger
⭐
145
Chrome Keylogger Extension | Post Exploitation Tool
Proton
⭐
142
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Evasor
⭐
138
A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies
Awesome Malware
⭐
114
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Bella
⭐
113
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Postexploits
⭐
111
(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Punk.py
⭐
110
unix SSH post-exploitation 1337 tool
Atomic Red Team Intelligence C2
⭐
98
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Thoron
⭐
87
Thoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Gtfonow
⭐
70
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Intersect 2.5
⭐
59
Post-Exploitation Framework
Decryptrdcmanager
⭐
59
.NET 4.0 Remote Desktop Manager Password Gatherer
Pxenum
⭐
30
A shell script that automatically performs a series of *NIX enumeration tasks.
1-54 of 54 projects
Advertising
📦 10
All Projects
Application Programming Interfaces
📦 124
Applications
📦 192
Artificial Intelligence
📦 78
Blockchain
📦 73
Build Tools
📦 113
Cloud Computing
📦 80
Code Quality
📦 28
Collaboration
📦 32
Command Line Interface
📦 49
Community
📦 83
Companies
📦 60
Compilers
📦 63
Computer Science
📦 80
Configuration Management
📦 42
Content Management
📦 175
Control Flow
📦 213
Data Formats
📦 78
Data Processing
📦 276
Data Storage
📦 135
Economics
📦 64
Frameworks
📦 215
Games
📦 129
Graphics
📦 110
Hardware
📦 152
Integrated Development Environments
📦 49
Learning Resources
📦 166
Legal
📦 29
Libraries
📦 129
Lists Of Projects
📦 22
Machine Learning
📦 347
Mapping
📦 64
Marketing
📦 15
Mathematics
📦 55
Media
📦 239
Messaging
📦 98
Networking
📦 315
Operating Systems
📦 89
Operations
📦 121
Package Managers
📦 55
Programming Languages
📦 245
Runtime Environments
📦 100
Science
📦 42
Security
📦 396
Social Media
📦 27
Software Architecture
📦 72
Software Development
📦 72
Software Performance
📦 58
Software Quality
📦 133
Text Editors
📦 49
Text Processing
📦 136
User Interface
📦 330
User Interface Components
📦 514
Version Control
📦 30
Virtualization
📦 71
Web Browsers
📦 42
Web Servers
📦 26
Web User Interface
📦 210