killchain-compendium/Post Exploitation/References.md

59 lines
1.8 KiB
Markdown
Raw Normal View History

2022-11-11 01:15:07 +01:00
# Post Exploitation Tools
## Privilege Escalation
[Carlos' Linpeas](https://github.com/carlospolop/PEASS-ng.git)
[Linpeas via HTTPS](https://linpeas.sh/)
[Seatbelt](https://github.com/GhostPack/Seatbelt.git)
[hemp3l's sucrack](https://github.com/hemp3l/sucrack.git)
[linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker.git)
[Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git)
[Windows-Exploit-Suggester Python3](https://github.com/Pwnistry/Windows-Exploit-Suggester-python3.git)
[Windows-Exploit-Suggester Next Generation](https://github.com/bitsadmin/wesng.git)
2022-11-11 01:15:07 +01:00
## Firefox Decryption
[Firefox Decrypt](https://github.com/unode/firefox_decrypt.git)
[Firepwd](https://github.com/lclevy/firepwd.git)
## Kerberos
[Kerberoast](https://gitlab.com/kalilinux/packages/kerberoast.git)
## Mimikatz
[Gentilkiwi's Mimikatz](https://github.com/gentilkiwi/mimikatz.git)
2022-11-11 01:15:07 +01:00
## Command and Control Frameworks
There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0) which collected nearly every C2 out there. Here is a selection of some of them.
* Fortra
[Cobalt Strike](https://www.cobaltstrike.com/)
* Rapid7
[Metasploit](https://github.com/rapid7/metasploit-framework.git)
[Archived Armitage Website](https://web.archive.org/web/20211006153158/http://www.fastandeasyhacking.com/)
[Armitage on gitlab](https://gitlab.com/kalilinux/packages/armitage)
* BC-Security
[Empire](https://github.com/BC-SECURITY/Empire.git)
[Empire's Starkiller](https://github.com/BC-SECURITY/Starkiller.git)
* Cobbr
[Covenant](https://github.com/cobbr/Covenant.git)
* BishopFox
[BishopFox's Site](https://bishopfox.com/)
[Sliver](https://github.com/BishopFox/sliver.git)
* Dark Vortex
[Bruteratel](https://bruteratel.com/)