| Tools |
Description |
| cryptCat |
It reads and writes data across all network connections, using TCP or UDP protocol while encrypting the data that is transmitted. |
| Cymothoa |
It is a backdooring tool that injects backdoor's shellcode into an existing process. |
| Dbd |
It is a Netcat-clone, which offers strong encryption and runs on Unix like operating systems and on Microsoft Win32. |
| dns2tcp |
It is a network tool designed to relay TCP connection through DNS traffic. |
| HTTPTunnel |
It is used to tunnel network connections through a restrictive HTTP proxy. |
| Intersect |
It is an Intersect Post-exploitation framework. |
| Nishang |
It enables usages of PowerShell for offensive security and posts exploitation during Penetration Tests. |
| polenum |
It extracts the password policy from a windows system. |
| PowerSploit |
It is a series of Microsoft Powershell scripts that can be used in post-exploitation scenarios during authorized penetration tests. |
| Pwnat |
It is a NAT to NAT client-server communication. |
| RidEnum |
It is an attack that enumerates user accounts through null sessions and SID to RID enum. |
| sbd |
It is a secure backdoor for Linux and Windows systems. |
| Shellter |
It is a dynamic shellcode injection tool and dynamic PE infector used to inject shellcode into native Windows applications. |
| U3-Pwn |
It is a Metasploit Payload Injection Tool for SanDisk Devices. |
| Webshells |
It is a collection of webshells for ASP, ASPX, CFM, JSP, Perl, and PHP servers. |
| Weevely |
It is a stealth web shell that stimulates telnet-like connections used for web application post exploitation. |
| Winexe |
It is a remote windows command executor. |