Bashark 2.0
Post exploitation toolkit
Bashark aids pentesters and security researchers during the post-exploitation phase of security audit.
Usage
To launch this tool on compromised host, simply source the bashark.sh
script from terminal:
$ source bashark.sh
Then type help
to see the help menu
License
This software is under MIT License