Searching protocol for "post-exploitation"
Master post-exploitation and C2 operations.
Post-exploitation C2 framework.
Remote administration and post-exploitation.
Stealth PHP webshell for post-exploitation.
Interactive PHP webshell post-exploitation.
Collaborative .NET C2 framework.
Master penetration testing with Metasploit.
Authorized Metasploit pentests, made efficient.
Harvest Windows credentials and pivot.
Internal network and AD pentesting toolkit.
Proxy-aware C2 framework
Gain root/admin access with proven techniques.