Windows-Post-Exploitation
post-exploitation toolkit
Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
528 stars
19 watching
117 forks
last commit: over 3 years ago
Linked from 1 awesome list
command-lineethical-hackingexploiting-windowshackinghacking-toolpost-exploitation
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of post-exploitation tools and scripts for various operating systems. | 1,555 |
| An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,204 |
| A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 543 |
| A collection of precompiled Windows exploit binaries | 1,837 |
| An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |
| A Rust framework providing implants and tools for command-and-control operations in penetration testing | 565 |
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 900 |
| A toolset for rapidly creating and testing post-exploitation environments on Windows machines | 420 |
| A post-exploitation toolset designed to operate covertly on heavily monitored environments. | 2,058 |
| A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 |
| A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 59 |
| A repository of remote code execution exploit samples and proof-of-concepts for Windows. | 741 |
| An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
| A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 |