Maintaining Access Main menu
AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It offers a robust set of…
In the realm of remote desktop management, evilrdp stands out as a powerful tool designed to provide extended control over…
GraphRunner is a powerful post-exploitation toolset designed for interacting with the Microsoft Graph API, enabling red teams and attackers to…
BYOB (Build Your Own Botnet) is an open-source post-exploitation framework designed primarily for educational and research purposes. It enables students,…
Stifle is a specialized .NET utility designed for post-exploitation scenarios, enabling attackers or penetration testers to exploit explicit certificate mapping…
The OdinLdr and Draugr tools, alongside Cobalt Strike's User-Defined Reflective Loader (UDRL), represent advanced mechanisms for enhancing stealth and flexibility…
Krueger is a Proof of Concept (PoC) .NET post-exploitation tool designed to disable Endpoint Detection and Response (EDR) systems during…
Sunder is a Windows rootkit inspired by the Lazarus Group's FudModule rootkit, designed to exploit vulnerabilities in kernel drivers to…
Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration of sensitive information from Linux…
PoC tool for decrypting and collecting GlobalProtect configuration, cookies, and HIP files from windows client installations. Usage Run as standalone…