Post-Exploitation

Arsenal d'outils pour le hacking éthique et le pentesting

En vedette

Chisel

Post-Exploitation
Gratuit

Fast TCP/UDP tunnel, transported over HTTP and secured via SSH.

tunnelinghttpgo
13,200
ACCÈS
En vedette

Sliver C2

Post-Exploitation
Gratuit

Open source cross-platform C2 framework. Implants for Windows, macOS and Linux.

c2redteamgo
8,400
ACCÈS
En vedette

Havoc C2

Post-Exploitation
Gratuit

Modern C2 framework with low barrier to entry. Active community development.

c2redteamcpp
7,200
ACCÈS
En vedette

Empire C2

Post-Exploitation
Gratuit

C2 framework with PowerShell, Python and C# agents. Large module library.

c2powershellpython
7,800
ACCÈS
En vedette

Ligolo-ng

Post-Exploitation
Gratuit

Simple and lightweight tunneling and pivoting tool based on TUN interface.

pivotingtunnelinggo
2,800
ACCÈS
En vedette

Cobalt Strike

Post-Exploitation
Payant

Commercial adversary simulation platform. Beacon implants with covert communications.

c2redteamcommercial
ACCÈS
En vedette

Mimikatz

Post-Exploitation
Gratuit

Legendary tool for extracting Windows credentials. Dumps NTLM, Kerberos tickets.

windowscredentialskerberos
19,500
ACCÈS
En vedette

Rubeus

Post-Exploitation
Gratuit

C# tool for Kerberos abuse. Kerberoasting, AS-REP roasting and more.

kerberoswindowscsharp
4,200
ACCÈS
En vedette

BloodHound

Post-Exploitation
Gratuit

Tool for mapping Active Directory relationships and finding attack paths.

adwindowsgraph
9,800
ACCÈS
En vedette

CrackMapExec

Post-Exploitation
Gratuit

Swiss army knife for Windows network pentesting. Validates credentials, executes modules.

windowssmbcredentials
8,200
ACCÈS
En vedette

Impacket

Post-Exploitation
Gratuit

Collection of Python classes for working with network protocols. Essential for AD attacks.

pythonsmbwindows
13,600
ACCÈS
En vedette

Evil-WinRM

Post-Exploitation
Gratuit

WinRM shell for hacking. File upload, AMSI bypass, and more features.

windowswinrmruby
4,500
ACCÈS

Mythic C2

Post-Exploitation
Gratuit

Open source C2 framework with multiple agents and communication protocols.

c2redteamagents
3,600
ACCÈS

Merlin C2

Post-Exploitation
Gratuit

Post-exploitation C2 tool that uses HTTP/2 and HTTP/3 for communications.

c2http2go
5,100
ACCÈS
[ AD_SLOT: resources-bottom ]