mostaphabahadou / postenumView external linksLinks
A lightweight, portable, and modular tool for Linux enumeration and privilege escalation.
☆292Jan 5, 2026Updated last month
Alternatives and similar repositories for postenum
Users that are interested in postenum are comparing it to the libraries listed below
Sorting:
- A Network Enumeration and Attack Toolset for Windows Active Directory Environments.☆247Jun 19, 2024Updated last year
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆248Sep 9, 2021Updated 4 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆541Apr 14, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Mar 27, 2022Updated 3 years ago
- Linux post exploitation privilege escalation enumeration☆259Aug 20, 2020Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆298Oct 2, 2019Updated 6 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- HashCobra Hash Cracking tool.☆122Dec 1, 2020Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Framework for exploiting local vulnerabilities☆84Nov 18, 2023Updated 2 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 6 months ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆823Nov 15, 2025Updated 3 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆781Jun 20, 2020Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Mar 24, 2021Updated 4 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆522Nov 26, 2022Updated 3 years ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆504Sep 23, 2025Updated 4 months ago
- Active Directory Assessment and Privilege Escalation Script☆1,132Dec 7, 2022Updated 3 years ago
- small python3 tool to check common vulnerabilities in SMTP servers☆163Apr 21, 2023Updated 2 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,415Oct 3, 2020Updated 5 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- An open source script to perform malware static analysis on Portable Executable☆329May 23, 2023Updated 2 years ago
- A script used to create a whonix like gateway/workstation environment with docker containers.☆126Oct 13, 2019Updated 6 years ago
- For all your network pentesting needs☆153Jun 26, 2024Updated last year
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆68Jan 15, 2026Updated last month
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- Network Pivoting Toolkit☆456Aug 26, 2023Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Dec 20, 2020Updated 5 years ago
- Red Team Tool Kit☆1,132Dec 8, 2022Updated 3 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,860Aug 12, 2021Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,840Dec 25, 2023Updated 2 years ago
- File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.☆272Mar 24, 2021Updated 4 years ago