Post-Exploitation
Arsenal d'outils pour le hacking éthique et le pentesting
Chisel
Post-ExploitationFast TCP/UDP tunnel, transported over HTTP and secured via SSH.
Sliver C2
Post-ExploitationOpen source cross-platform C2 framework. Implants for Windows, macOS and Linux.
Havoc C2
Post-ExploitationModern C2 framework with low barrier to entry. Active community development.
Empire C2
Post-ExploitationC2 framework with PowerShell, Python and C# agents. Large module library.
Ligolo-ng
Post-ExploitationSimple and lightweight tunneling and pivoting tool based on TUN interface.
Cobalt Strike
Post-ExploitationCommercial adversary simulation platform. Beacon implants with covert communications.
Mimikatz
Post-ExploitationLegendary tool for extracting Windows credentials. Dumps NTLM, Kerberos tickets.
Rubeus
Post-ExploitationC# tool for Kerberos abuse. Kerberoasting, AS-REP roasting and more.
BloodHound
Post-ExploitationTool for mapping Active Directory relationships and finding attack paths.
CrackMapExec
Post-ExploitationSwiss army knife for Windows network pentesting. Validates credentials, executes modules.
Impacket
Post-ExploitationCollection of Python classes for working with network protocols. Essential for AD attacks.
Evil-WinRM
Post-ExploitationWinRM shell for hacking. File upload, AMSI bypass, and more features.
Mythic C2
Post-ExploitationOpen source C2 framework with multiple agents and communication protocols.
Merlin C2
Post-ExploitationPost-exploitation C2 tool that uses HTTP/2 and HTTP/3 for communications.