Pós-Exploração
Arsenal de ferramentas para hacking ético e pentesting
Chisel
Pós-ExploraçãoFast TCP/UDP tunnel, transported over HTTP and secured via SSH.
Sliver C2
Pós-ExploraçãoOpen source cross-platform C2 framework. Implants for Windows, macOS and Linux.
Havoc C2
Pós-ExploraçãoModern C2 framework with low barrier to entry. Active community development.
Empire C2
Pós-ExploraçãoC2 framework with PowerShell, Python and C# agents. Large module library.
Ligolo-ng
Pós-ExploraçãoSimple and lightweight tunneling and pivoting tool based on TUN interface.
Cobalt Strike
Pós-ExploraçãoCommercial adversary simulation platform. Beacon implants with covert communications.
Mimikatz
Pós-ExploraçãoLegendary tool for extracting Windows credentials. Dumps NTLM, Kerberos tickets.
Rubeus
Pós-ExploraçãoC# tool for Kerberos abuse. Kerberoasting, AS-REP roasting and more.
BloodHound
Pós-ExploraçãoTool for mapping Active Directory relationships and finding attack paths.
CrackMapExec
Pós-ExploraçãoSwiss army knife for Windows network pentesting. Validates credentials, executes modules.
Impacket
Pós-ExploraçãoCollection of Python classes for working with network protocols. Essential for AD attacks.
Evil-WinRM
Pós-ExploraçãoWinRM shell for hacking. File upload, AMSI bypass, and more features.
Mythic C2
Pós-ExploraçãoOpen source C2 framework with multiple agents and communication protocols.
Merlin C2
Pós-ExploraçãoPost-exploitation C2 tool that uses HTTP/2 and HTTP/3 for communications.