Exploitation notes

Refernce : https://github.com/0xsyr0/Awesome-Cybersecurity-Handbooks/blob/main/handbooks/08_exploitation_tools.md

Exploitation Tools

Table of Contents

Resources

Name
Description
URL

Evil-WinRM

The ultimate WinRM shell for hacking/pentesting

https://github.com/Hackplayers/evil-winrm

Exploitalert

Listing of latest Exploits

https://exploitalert.com

Metasploit

Metasploit Framework

https://github.com/rapid7/metasploit-framework

TheFatRat

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android.

https://github.com/Screetsec/TheFatRat

ImageTragick

https://imagetragick.com/

MSL / Polyglot Attack

https://insert-script.blogspot.com/2020/11/imagemagick-shell-injection-via-pdf.html

poc.svg

Executing Payload

Metasploit

https://github.com/rapid7/metasploit-framework

https://github.com/rapid7/metasploit-payloads

General Usage

Metasploit through Proxychains

Meterpreter Listener

Generate Payload

Setup Listener for Microsoft Windows

Setup Listener for MacOS

Download Files

Enumeration

SNMP Scan

SNMP Enum

Tomcat Enumeration

Exploit Suggester

Execute Binaries

Port Forwarding with Chisel

Pivoting

Port Forwarding with Meterpreter

SOCKS Proxy on Meterpreter Sessions

Pivoting with Meterpreter

Auxiliary Handling

Auxiliary Setup

Auxiliary Output Directory

Persistence

Setting up Persistent Access

Copy exploit to target machine

Persistence through persistence_service

Persistence through Persistence_exe

Persistence through Registry

Exploit Handling

WP Shell Upload

Dedicated Exploit

Additional Options

searchsploit

Last updated

Was this helpful?