# Post Exploitation Tools

## Privilege Escalation

[Carlos' Linpeas](https://github.com/carlospolop/PEASS-ng.git)
[Linpeas via HTTPS](https://linpeas.sh/)
[Seatbelt](https://github.com/GhostPack/Seatbelt.git)
[hemp3l's sucrack](https://github.com/hemp3l/sucrack.git)
[linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker.git)
[Windows-Exploit-Suggester](https://github.com/AonCyberLabs/Windows-Exploit-Suggester.git)
[Windows-Exploit-Suggester Python3](https://github.com/Pwnistry/Windows-Exploit-Suggester-python3.git)
[Windows-Exploit-Suggester Next Generation](https://github.com/bitsadmin/wesng.git)

## Firefox Decryption

[Firefox Decrypt](https://github.com/unode/firefox_decrypt.git)
[Firepwd](https://github.com/lclevy/firepwd.git)

## Kerberos

[Kerberoast](https://gitlab.com/kalilinux/packages/kerberoast.git)

## Mimikatz

[Gentilkiwi's Mimikatz](https://github.com/gentilkiwi/mimikatz.git)


## Command and Control Frameworks

There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0) which collected nearly every C2 out there. Here is a selection of some of them.

* Fortra

[Cobalt Strike](https://www.cobaltstrike.com/)

* Rapid7

[Metasploit](https://github.com/rapid7/metasploit-framework.git)
[Archived Armitage Website](https://web.archive.org/web/20211006153158/http://www.fastandeasyhacking.com/)
[Armitage on gitlab](https://gitlab.com/kalilinux/packages/armitage)

* BC-Security

[Empire](https://github.com/BC-SECURITY/Empire.git)
[Empire's Starkiller](https://github.com/BC-SECURITY/Starkiller.git)

* Cobbr

[Covenant](https://github.com/cobbr/Covenant.git)

* BishopFox

[BishopFox's Site](https://bishopfox.com/)
[Sliver](https://github.com/BishopFox/sliver.git)

* Dark Vortex

[Bruteratel](https://bruteratel.com/)