DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that …
Enumy – Linux Post Exploitation Privilege Escalation Enumeration
Enumy is portable executable that you drop on target Linux machine during a pentest or CTF in the post exploitation …
AutoRDPwn v5.1 – The Shadow Attack Framework
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …