Windows-Post-Exploitation

post-exploitation toolkit

Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

GitHub

524 stars
19 watching
116 forks
last commit: about 3 years ago
Linked from 1 awesome list

command-lineethical-hackingexploiting-windowshackinghacking-toolpost-exploitation

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
mubix/post-exploitation A collection of post-exploitation tools and scripts for various operating systems. 1,554
byt3bl33d3r/silenttrinity An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. 2,196
d4rk007/redghost A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems 536
abatchy17/windowsexploits A collection of precompiled Windows exploit binaries 1,829
daviddikker/endgame An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access 188
postrequest/link A Rust framework providing implants and tools for command-and-control operations in penetration testing 563
autistic-symposium/sec-pentesting-toolkit A comprehensive collection of security resources and tools for pentesting and reverse engineering 162
billy-ellis/exploit-challenges A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills 898
francisck/danderspritz_lab A toolset for rapidly creating and testing post-exploitation environments on Windows machines 419
bats3c/shad0w A post-exploitation toolset designed to operate covertly on heavily monitored environments. 2,045
lgcarmo/wpexploitation A tool designed to facilitate the collection of information on Windows systems during a penetration test 0
atorrescogollo/offensive-tor-toolkit A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. 58
smgorelik/windows-rce-exploits A repository of remote code execution exploit samples and proof-of-concepts for Windows. 740
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. 25
rkervella/carbonmonoxide A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. 23