- Post Exploitation Strategys Here - by b0nd
- Post Exploitation Command List
- Post Exploitation - 7 Linux Shells Using Built-in Tools
- Post Exploitation - Run backdoor with root privileges
- Post Exploitation - Run direct connect backdoor with root privilege
- Penetration testing with Domain Controller and Finding Group Policy XML password file
- Post Exploitation - wget using windows powershell and bitsadmin on target machine