The Wayback Machine - https://web.archive.org/web/20200727155641/https://github.com/topics/post-exploitation
Skip to content
#

post-exploitation

Here are 117 public repositories matching this topic...

ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
  • Updated Jul 24, 2020
  • Python

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
  • Updated Mar 9, 2020
  • Shell
sifter

*Frequently Updated. Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface mapping rapidly using ASM.
  • Updated Jul 27, 2020
  • Shell

[Draft]Awesome Cyber Security Resource Collection. Currently contains 8000+ open source repositories, and not very well classified. For each repository, extra info included: star count, commit count, last update time. This is the DRAFT version.
  • Updated Dec 23, 2019

Improve this page

Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.