Windows-Post-Exploitation
post-exploitation toolkit
Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
524 stars
19 watching
116 forks
last commit: about 3 years ago
Linked from 1 awesome list
command-lineethical-hackingexploiting-windowshackinghacking-toolpost-exploitation
Related projects:
Repository | Description | Stars |
---|---|---|
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,196 |
d4rk007/redghost | A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 536 |
abatchy17/windowsexploits | A collection of precompiled Windows exploit binaries | 1,829 |
daviddikker/endgame | An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 188 |
postrequest/link | A Rust framework providing implants and tools for command-and-control operations in penetration testing | 563 |
autistic-symposium/sec-pentesting-toolkit | A comprehensive collection of security resources and tools for pentesting and reverse engineering | 162 |
billy-ellis/exploit-challenges | A collection of vulnerable ARM binaries designed to help practitioners develop exploit development skills | 898 |
francisck/danderspritz_lab | A toolset for rapidly creating and testing post-exploitation environments on Windows machines | 419 |
bats3c/shad0w | A post-exploitation toolset designed to operate covertly on heavily monitored environments. | 2,045 |
lgcarmo/wpexploitation | A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 |
atorrescogollo/offensive-tor-toolkit | A toolkit for utilizing Tor network for various exploitation and post-exploitation tasks. | 58 |
smgorelik/windows-rce-exploits | A repository of remote code execution exploit samples and proof-of-concepts for Windows. | 740 |
exp-sky/hitcon-2014-ie-11-0day-windows-8.1-exploit | An exploit for a previously unknown vulnerability in Internet Explorer 11 and Windows 8.1, allowing unauthorized access to the system. | 25 |
rkervella/carbonmonoxide | A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 23 |