• Stars
    star
    507
  • Rank 87,068 (Top 2 %)
  • Language
    HTML
  • License
    MIT License
  • Created about 11 years ago
  • Updated almost 5 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Post Exploitation Wiki

Post Exploitation Wiki

This wiki is powered by MDwiki which is a self contained wiki in a single HTML file.

All you have to do to use the wiki is clone the repo to anywhere you can open HTML, served or local.

Contributors please see here: https://github.com/mubix/post-exploitation-wiki/wiki/Contributor-Wiki

Live Online Copy:

You can find a copy of the project online at: http://mubix.github.io/post-exploitation-wiki/. If you are reading this from the live website and want to get to the Github repository click here -> https://github.com/mubix/post-exploitation-wiki.

Offline Use:

  1. Clone the repository or pull the archive (download zip) of the repo
  2. Open index.html
  3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use Mongoose Tiny or HFS to host the files locally. On OSX and Linux python -m SimpleHTTPServer seems to work just fine.

Reference Binaries:

If the binary referenced isn't built into the respective OS, can be found here: https://github.com/mubix/post-exploitation

Known issue with Chrome:

Chrome doesn't allow local file access from local files loaded in the browser (ala index.html loading index.md). There are two ways around this. Use a web server to host it (Apache, nginx, python SimpleHTTPServer, etc) or start Chrome with the --allow-file-access-from-files argument. See here for more details: http://dynalon.github.io/mdwiki/#!faq.md

More info about MDwiki:

http://dynalon.github.io/mdwiki/#!index.md

More Repositories

1

post-exploitation

Post Exploitation Collection
C
1,554
star
2

shellshocker-pocs

Collection of Proof of Concepts and Potential Targets for #ShellShocker
Python
881
star
3

solarflare

SolarWinds Orion Account Audit / Password Dumping Utility
C#
342
star
4

netview

Netview enumerates systems using WinAPI calls
C++
280
star
5

vt-notify

Get email notification when Virus Total has a copy of your binary.
Ruby
164
star
6

CVE-2021-44228-Log4Shell-Hashes

Hashes for vulnerable LOG4J versions
153
star
7

IOXIDResolver

IOXIDResolver.py from AirBus Security
Python
152
star
8

osx-wificleaner

Cleans out "open" wireless connections from OSX machine
Python
151
star
9

pykek

Kerberos Exploitation Kit
Python
125
star
10

howtowinccdc

Notes, Slides, Comments and Commands on How to Win CCDC
117
star
11

akb

Attack Knowledge Base
100
star
12

cfdb

Common Findings Database
99
star
13

Not-In-Pentesting-Class

The Dirty Secrets They Didn't Teach You In Pentesting Class
Ruby
94
star
14

repos

List of Repositories
89
star
15

open-ssids

SSIDs for the Hak5 Wifi Pineapple's PineAP setup
79
star
16

ditto

Binary resource copier
Objective-C
78
star
17

WhiteChapel

password cracking front end
CSS
57
star
18

sectaskbars

Security Product Taskbar Icons (to identify from screenshots)
55
star
19

tools

Operational toolset utilizing git's submodule feature
Lua
52
star
20

FakeNetBIOS

See here:
C
41
star
21

stuff

Things I've coded, or use (cause I can't find them online anymore)
Ruby
33
star
22

DeleteThatTweet

Monitors a Twitter stream and saves off any tweet that is deleted.
Ruby
26
star
23

manage2decrypt

ManageEngine OpManager Decryption Tools
Python
26
star
24

windows-hardening

Because I can't find scripts to do this anywhere else...
25
star
25

windows-declutter

Windows 10 De-Clutter script
PowerShell
24
star
26

ccdc_malware

Talk given at DerbyCon and RuxCon 2016
22
star
27

mubix.github

Malicious Link Blog
HTML
22
star
28

local-hibp

How to set up a local copy of Have-I-Been-Pwned's password checking service
Ruby
21
star
29

whitechapel-ng

Next Generation of White Chapel
Ruby
21
star
30

attackbox

Ansible scripts to build an attack box
Shell
21
star
31

lmo

LetMeOutOfYour.net Resources
Python
19
star
32

metasploitwiki

Clone of Metasploit's wiki w/ additions
HTML
15
star
33

Interceptor

PowerShell HTTP(s) Intercepting Proxy
PowerShell
14
star
34

hackingtogether

#HackingTogether
HTML
14
star
35

securitytitles.com

Standardizing Security Titles
13
star
36

ctf

Capture The Flag Information
JavaScript
12
star
37

GScriptOldEmal

Deletes old email from my Gmail accounts
JavaScript
12
star
38

twitter-list-follow

Follow all members of a list
Ruby
11
star
39

elgamalcrypto

Simple Python Elgamal Encryption and Decryption Tool
Python
8
star
40

presentations

Public copies of my previous presentations
7
star
41

bliizard_escalation

6
star
42

decryptcpuu

Decrypt "Unrestricted" CPUU.ini passwords
C++
6
star
43

ctfjournal.com

CTF Journal Blog - All are welcome
6
star
44

twitterfriendsopml

Generate an OPML based on the URLs in the people you follow on Twitter's bios
Python
5
star
45

portals

Repository of captive portals from around the world
5
star
46

8021xbridge

Automatically exported from code.google.com/p/8021xbridge
Shell
4
star
47

disappeared

Repo of sites and tools that went %POOF%
3
star
48

meterpy

Meterpreter On-target Python Scripts
3
star
49

random-scripts

Just random scripts of things I don't want to lose
Ruby
3
star
50

squirtle

A fork of the Squirtle project from: http://code.google.com/p/squirtle/
3
star
51

PowerWorm

Analysis, detection, and removal of the "Power Worm" PowerShell-based malware
PowerShell
2
star
52

mubix

2
star
53

ntlmv1des

Cracks DES C3 piece of NTLMv1 and combines into Crack.sh format
1
star
54

epilogue

ShmooCon Epilogue Website
HTML
1
star