Below some tools you can use for post exploitation while performing a penetration test:

Cryptcat: Netcat enhanced with twofish encryption

Hacker Defender: rootkit for Windows

Meterpreter: provides an interactive shell which allows you to use extensible features at run time

Netcat: networking utility which reads and writes data across network connections using the TCP/IP protocol.

to be continued…

My way to go

## Project* Find Amazon s3 buckets: `s3-buckets-bruteforce /opt/SecLists/mine/s3-buckets.txt -` if found: `s3-buckets-extractor ` * Ex...… Continue reading

« Pentest - Vulnerability assessment tools

Published on November 04, 2014

Pentest - Information gathering tools »

Published on November 04, 2014