2022-11-11 01:15:07 +01:00
# Post Exploitation Tools
## Privilege Escalation
[Carlos' Linpeas ](https://github.com/carlospolop/PEASS-ng.git )
[Linpeas via HTTPS ](https://linpeas.sh/ )
[Seatbelt ](https://github.com/GhostPack/Seatbelt.git )
[hemp3l's sucrack ](https://github.com/hemp3l/sucrack.git )
[linuxprivchecker ](https://github.com/sleventyeleven/linuxprivchecker.git )
2022-11-13 01:27:45 +01:00
[Windows-Exploit-Suggester ](https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git )
[Windows-Exploit-Suggester Python3 ](https://github.com/Pwnistry/Windows-Exploit-Suggester-python3.git )
[Windows-Exploit-Suggester Next Generation ](https://github.com/bitsadmin/wesng.git )
2022-11-11 01:15:07 +01:00
## Firefox Decryption
[Firefox Decrypt ](https://github.com/unode/firefox_decrypt.git )
[Firepwd ](https://github.com/lclevy/firepwd.git )
## Kerberos
[Kerberoast ](https://gitlab.com/kalilinux/packages/kerberoast.git )
## Mimikatz
[Gentilkiwi's Mimikatz ](https://github.com/gentilkiwi/mimikatz.git )
2022-11-13 01:27:45 +01:00
2022-11-11 01:15:07 +01:00
## Command and Control Frameworks
There is a [C2 Tools overview ](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0 ) which collected nearly every C2 out there. Here is a selection of some of them.
* Fortra
[Cobalt Strike ](https://www.cobaltstrike.com/ )
* Rapid7
[Metasploit ](https://github.com/rapid7/metasploit-framework.git )
[Archived Armitage Website ](https://web.archive.org/web/20211006153158/http://www.fastandeasyhacking.com/ )
[Armitage on gitlab ](https://gitlab.com/kalilinux/packages/armitage )
* BC-Security
[Empire ](https://github.com/BC-SECURITY/Empire.git )
[Empire's Starkiller ](https://github.com/BC-SECURITY/Starkiller.git )
* Cobbr
[Covenant ](https://github.com/cobbr/Covenant.git )
* BishopFox
[BishopFox's Site ](https://bishopfox.com/ )
[Sliver ](https://github.com/BishopFox/sliver.git )
* Dark Vortex
[Bruteratel ](https://bruteratel.com/ )