1 |
 |
Metasploit And Armitage Training - Post Exploitation (4/6) |
11 years, 9 months |
ArmitageHacker |
armitage, meterpreter, metasploit, post-exploitation |
5719 |
1 |
2 |
 |
Derbycon 2011 Carlos Perez (Darkoperator) - Tactical Post Exploitation |
11 years, 8 months |
Danladi |
post-exploitation, derbycon, 2011 |
3353 |
None |
3 |
 |
Securitytube Metasploit Framework Expert ( Armitage ) |
11 years, 5 months |
ArmitageHacker |
amitage, metasploit, reconnaissance, exploitation, post-exploitation, demo, smfe |
41911 |
46 |
4 |
 |
Intersect: Post-Exploitation Framework |
11 years, 1 month |
BSL |
Python, Intersect, post-exploitation, framework, automation |
5417 |
None |
5 |
 |
Intersect Framework :: Install Persistent Backdoors |
11 years, 1 month |
BSL |
Intersect, python, post-exploitation, framework, backdoors |
5997 |
None |
6 |
 |
Covert Vpn - Layer 2 Pivoting |
10 years, 9 months |
ArmitageHacker |
Cobalt Strike, Armitage, pivoting, vpn pivoting, meterpreter, post-exploitation |
4499 |
None |
7 |
 |
Beacon - Covert Command And Control For Cobalt Strike |
10 years, 8 months |
ArmitageHacker |
beaconing, malware, command and control, post-exploitation, APT, cobalt strike, armitage, C2, DNS, covert communication |
4391 |
None |
8 |
 |
Post Exploitation Wireless + Windows 7 |
10 years, 6 months |
L33T |
wireless, post-exploitation, hacking |
4357 |
None |
9 |
 |
Linux Post - Exploitation Using Metasploit Framework |
10 years, 5 months |
L33T |
post-exploitation, hacking, hack |
6971 |
None |
10 |
 |
Advanced Post - Exploitation Using Mimikatz |
10 years, 4 months |
L33T |
hacking, hack, exploitation, post-exploitation |
4433 |
None |
11 |
 |
Post -- Exploitation Dump Data From The Victim Machine |
10 years, 4 months |
L33T |
post-exploitation, metasploit, data, windows |
3716 |
None |
12 |
 |
Post - Exploitation Railgun File Creation And Beep |
10 years, 4 months |
L33T |
railgun, metasploit, beef, post-exploitation |
2997 |
None |
13 |
 |
Meterpreter Swaparoo Post Exploit Script |
9 years, 11 months |
Alone |
hacking, hack, exploitation, post-exploitation, advanced-hacking |
4453 |
None |
14 |
 |
Offensive Security 2013 - Meterpreter And Post Exploitation |
9 years, 11 months |
Alone |
hacking, hack, shell, meterpreter, post-exploitation |
3931 |
None |
15 |
 |
Armitage Pivoting |
9 years, 9 months |
tinitee |
Hackin, hack, armitage, metasploit, post-exploitation, pivoting |
2880 |
None |
16 |
 |
Penetration Testing And Post Exploitation With Armitage And Msfconsole |
9 years, 8 months |
tinitee |
metasploit, hacking, hack, Armitage, post-exploitation |
4207 |
None |
17 |
 |
Tradecraft (6 Of 9) - Post Exploitation With Meterpreter |
9 years, 7 months |
ArmitageHacker |
cobalt strike, meterpreter, post-exploitation, pivot, privilege escalation, proxychains, browser pivoting, pivoting |
3116 |
None |
18 |
 |
Metasploit: Dns Spoofing Through A Proxy Pac File |
9 years, 5 months |
BorjaMerino |
post-exploitation, proxy pac, dns spoofing, metasploit, meterpreter |
4187 |
None |