Skip to main content

Post-Exploitation

Mythic: An Introduction to the Open Source Post-Exploitation Framework

··1525 words·8 mins· loading · loading
Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

Covenant: Mastering Red Teaming Tactics

··2267 words·11 mins· loading · loading
This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations.

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

··7151 words·34 mins· loading · loading
This comprehensive guide explores Nishang, a collection of PowerShell scripts designed for penetration testing and red teaming, covering PowerShell basics, Nishang modules, advanced techniques, real-world applications, and modern evasion methods.

Empire: The Automated C2 Framework

··532 words·3 mins· loading · loading
Though legacy in name, Empire established the blueprint for modern C2. We explore the BC-Security fork, listeners, stagers, and how to operate a PowerShell-heavy campaign.

PowerSploit: Comprehensive Guide to PowerShell Offensive Security Operations

··6492 words·31 mins· loading · loading
A comprehensive guide to PowerSploit, the powerful PowerShell framework for offensive security operations, covering all modules, real-world attack scenarios, detection evasion techniques, and integration with modern red team workflows.

The Swiss Army Knife of Exploitation: Mastering the Metasploit Framework

··890 words·5 mins· loading · loading
A massive, comprehensive deep-dive into the Metasploit Framework for professional red teamers. Learn how to manage workspaces, master advanced Meterpreter extensions like Kiwi and Incognito, understand payload internals (Staged vs. Non-Staged), automate listeners with Resource Scripts, and pivot through complex networks.

Living off the Land - Advanced Windows CLI Tools for Red Team Operators

··752 words·4 mins· loading · loading
A comprehensive deep-dive into advanced Windows command-line tools. Learn how to leverage modern binaries like curl and tar, abuse legacy tools for download and execution, and perform stealthy data theft and persistence without triggering alerts.