Sunday, December 8, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...
Armory

Armory : A Tool Meant to Take in a Lot of...

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it...
DOGE

DOGE : Darknet Osint Graph Explorer

DOGE is a darknet Osint Graph Explorer, which is still in the development stage and you should use this in addtion to...
Twint

Twint : Twitter Intelligence Tool

TWINT is an advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape...
Linux

Top Best Useful Commands for Kali Linux?

Linux administrators can't live by the graphical UI alone. That is the reason we've ordered helpful Linux commands into this advantageous guide. Kali Linux...

Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1...
Remot3d

Remot3d : A Simple Tool Created for Large Pentesters

Remot3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by...