56 lines
1.5 KiB
Markdown
56 lines
1.5 KiB
Markdown
# Post Exploitation Tools
|
|
|
|
## Privilege Escalation
|
|
|
|
[Carlos' Linpeas](https://github.com/carlospolop/PEASS-ng.git)
|
|
[Linpeas via HTTPS](https://linpeas.sh/)
|
|
[Seatbelt](https://github.com/GhostPack/Seatbelt.git)
|
|
[hemp3l's sucrack](https://github.com/hemp3l/sucrack.git)
|
|
[linuxprivchecker](https://github.com/sleventyeleven/linuxprivchecker.git)
|
|
|
|
## Firefox Decryption
|
|
|
|
[Firefox Decrypt](https://github.com/unode/firefox_decrypt.git)
|
|
[Firepwd](https://github.com/lclevy/firepwd.git)
|
|
|
|
## Kerberos
|
|
|
|
[Kerberoast](https://gitlab.com/kalilinux/packages/kerberoast.git)
|
|
|
|
## Mimikatz
|
|
|
|
[Gentilkiwi's Mimikatz](https://github.com/gentilkiwi/mimikatz.git)
|
|
|
|
## Command and Control Frameworks
|
|
|
|
There is a [C2 Tools overview](https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc/edit#gid=0) which collected nearly every C2 out there. Here is a selection of some of them.
|
|
|
|
* Fortra
|
|
|
|
[Cobalt Strike](https://www.cobaltstrike.com/)
|
|
|
|
* Rapid7
|
|
|
|
[Metasploit](https://github.com/rapid7/metasploit-framework.git)
|
|
[Archived Armitage Website](https://web.archive.org/web/20211006153158/http://www.fastandeasyhacking.com/)
|
|
[Armitage on gitlab](https://gitlab.com/kalilinux/packages/armitage)
|
|
|
|
* BC-Security
|
|
|
|
[Empire](https://github.com/BC-SECURITY/Empire.git)
|
|
[Empire's Starkiller](https://github.com/BC-SECURITY/Starkiller.git)
|
|
|
|
* Cobbr
|
|
|
|
[Covenant](https://github.com/cobbr/Covenant.git)
|
|
|
|
* BishopFox
|
|
|
|
[BishopFox's Site](https://bishopfox.com/)
|
|
[Sliver](https://github.com/BishopFox/sliver.git)
|
|
|
|
* Dark Vortex
|
|
|
|
[Bruteratel](https://bruteratel.com/)
|
|
|