PDA

View Full Version : Post Exploitation



  1. Post Exploitation Strategys Here - by b0nd
  2. Post Exploitation Command List
  3. Post Exploitation - 7 Linux Shells Using Built-in Tools
  4. Post Exploitation - Run backdoor with root privileges
  5. Post Exploitation - Run direct connect backdoor with root privilege
  6. Penetration testing with Domain Controller and Finding Group Policy XML password file
  7. Post Exploitation - wget using windows powershell and bitsadmin on target machine