#postexploitation

Havoc
Havoc

Modern and malleable post-exploitation command and control framework.

merlin
merlin

Cross-platform post-exploitation HTTP/2 Command & Control server and agent.

pupy
pupy

Opensource, cross-platform C2 and post-exploitation framework written in python and C.

SharPersist
SharPersist

Windows persistence toolkit written in C#.

PersistenceSniper
PersistenceSniper

Hunt persistences implanted in Windows machines.

traitor
traitor

Automatic Linux privilege escalation via exploitation of low-hanging fruit.

Empire
Empire

Post-exploitation and adversary emulation framework that is used to aid Red Teams and pentesters.

Starkiller
Starkiller

Starkiller is a frontend for Empire.

Caldera
Caldera

Automated adversary emulation platform.

CrackMapExec
CrackMapExec

A swiss army knife for pentesting networks.

SharpSCCM
SharpSCCM

A post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager.

PowerMeUp
PowerMeUp

A small library of powershell scripts for post exploitation that you may need or use!

Mimicry
Mimicry

A dynamic deception tool that actively deceives an attacker.

MicroBurst
MicroBurst

A collection of scripts for assessing Microsoft Azure security.

PowerUpSQL
PowerUpSQL

A PowerShell toolkit for attacking SQL Server.

PoshC2
PoshC2

A proxy aware C2 framework used to aid with post-exploitation and lateral movement.

Invoke-PowerThIEf
Invoke-PowerThIEf

An Internet Explorer post exploitation library.

Vegile
Vegile

Post exploitation tool to maintain some level of acces.