Below some tools you can use for post exploitation while performing a penetration test:
Cryptcat: Netcat enhanced with twofish encryption
Hacker Defender: rootkit for Windows
Meterpreter: provides an interactive shell which allows you to use extensible features at run time
Netcat: networking utility which reads and writes data across network connections using the TCP/IP protocol.