Red Team — Post-Exploitation

Community

Master post-exploitation and C2 operations.

Authordefconxt
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill provides comprehensive guidance and commands for advanced post-exploitation techniques in red team engagements, covering privilege escalation, C2 operations, evasion, and persistence.

Core Features & Use Cases

  • Privilege Escalation: Detailed methods for Linux and Windows privilege escalation.
  • C2 Operations: Instructions for using Sliver and Metasploit for command and control.
  • Evasion Techniques: Strategies for bypassing AMSI, AV, and EDR.
  • Persistence & Pivoting: Methods for maintaining access and moving laterally within a network.
  • Use Case: A red team operator needs to escalate privileges on a compromised Linux host. They can consult this Skill for automated enumeration scripts, SUID abuse, sudo misconfigurations, and kernel exploit suggestions.

Quick Start

Use the Red Team Post-Exploitation skill to find Linux privilege escalation vectors.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: Red Team — Post-Exploitation
Download link: https://github.com/defconxt/CIPHER/archive/main.zip#red-team-post-exploitation

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.