# Post Exploitation Tools ## Privilege Escalation [Carlos' Linpeas](https://github.com/carlospolop/PEASS-ng.git) [Linpeas via HTTPS](https://linpeas.sh/) [Seatbelt](https://github.com/GhostPack/Seatbelt.git) [hemp3l's sucrack](https://github.com/hemp3l/sucrack.git) [linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker.git) [Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git) [Windows-Exploit-Suggester Python3](https://github.com/Pwnistry/Windows-Exploit-Suggester-python3.git) [Windows-Exploit-Suggester Next Generation](https://github.com/bitsadmin/wesng.git) ## Firefox Decryption [Firefox Decrypt](https://github.com/unode/firefox_decrypt.git) [Firepwd](https://github.com/lclevy/firepwd.git) ## Kerberos [Kerberoast](https://gitlab.com/kalilinux/packages/kerberoast.git) ## Mimikatz [Gentilkiwi's Mimikatz](https://github.com/gentilkiwi/mimikatz.git) ## Command and Control Frameworks There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0) which collected nearly every C2 out there. Here is a selection of some of them. * Fortra [Cobalt Strike](https://www.cobaltstrike.com/) * Rapid7 [Metasploit](https://github.com/rapid7/metasploit-framework.git) [Archived Armitage Website](https://web.archive.org/web/20211006153158/http://www.fastandeasyhacking.com/) [Armitage on gitlab](https://gitlab.com/kalilinux/packages/armitage) * BC-Security [Empire](https://github.com/BC-SECURITY/Empire.git) [Empire's Starkiller](https://github.com/BC-SECURITY/Starkiller.git) * Cobbr [Covenant](https://github.com/cobbr/Covenant.git) * BishopFox [BishopFox's Site](https://bishopfox.com/) [Sliver](https://github.com/BishopFox/sliver.git) * Dark Vortex [Bruteratel](https://bruteratel.com/)