
barq – The AWS Cloud Post Exploitation Framework
Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. perform enumeration and extraction.
Read more »
Vegile – Tool To Hidden Backdoor/Rootkits in Proses and Get Unlimited Sessions & Unstopable Backdoor
Vegile is a tool for Post exploitation Techniques in linux. This tool will set up your backdoor/rootkits hidden in specific process & get unlimited sessions
Read more »
Slackor – Golang Implant That Uses Slack as a Command and Control Server
Slackor is a Golang implant that uses Slack as a command and control server to agent. Slackor will able to use slack app as a bridge to control agent.
Read more »
Idisagree – Tool To Control Remote Computers Using Discord BOT
In hacker hand discord can do something to remote your computer. Idisagree is a tool that can remote computer using discord bot and python 3.
Read more »
FruityC2 – Tool To Control and Manage Agents From Server With Web Interface
FruityC2 is post exploitation tools that’s helping you to manage your victim from a website interface under the control of an operator.
Read more »
Merlin – Cross Platform Post Exploitation Tool With HTTP/2 Communications Command and Control Tool
Merlin is a cross-platform post-exploitation framework that leverages HTTP/2 communications to evade inspection. HTTP/2 is a relatively new protocol that requests Perfect Forward Secrecy (PFS) encryption cipher suites are used.
Read more »