Post Exploitation
Browse 4 cybersecurity tools tagged with "Post Exploitation"

PoshC2
Penetration Testing
PoshC2 on SecurityListing: A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

Guide to Ethical
Offensive Security
Guide to Ethical Hacking on SecurityListing: A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

PowerShell Cheat Sheet
Penetration Testing
PowerShell Cheat Sheet v. 4.0 on SecurityListing: A comprehensive PowerShell cheat sheet covering various tasks and techniques for file management, process management, network operations, and system administration.

Paving The Way
Offensive Security
Paving The Way to DA - Complete Post (Pt 1,2 & 3) on SecurityListing: A three-part educational series documenting techniques for achieving domain administrator privileges in Windows environments, covering attack methods, defenses, and remediation strategies.