Knowledge Base
  • Security
  • Computing
  • Programming
  • Electronics
  • Hacking
  • Making
  • Math
  • Miscellaneous
    • Security
      • Penetration Testing
      • Recon
      • Social Engineering
      • Physical Security
      • Exploitation
      • Web Security
      • Post-Exploitation
      • Tools
      • Red Teaming
      • Reverse Engineering
      • Fuzzing
      • Learning
      • Crypto
      • Embedded
      • Authentication
      • Cloud Security
      • Network Security
      • Operational Security
      • Wireless Security
      • Container Security
    • Computing
      • Custom Setups
      • Linux
      • Windows
      • Networking
      • Vim
      • tmux
      • Cloud
      • Docker
      • Utilities
      • KVM/Libvirt
      • Raspberry Pi
    • Programming
      • Regular Expressions
    • Electronics
      • Tools
      • JTAG
      • PCB Fabrication
      • Keyboards
      • Motors
      • Flash Memory
      • Useful Parts
    • Hacking
      • Culture
    • Making
      • 3D Printing
    • Math
      • Coupon Problem
      • Eliptic Curves
    • Miscellaneous
      • Writing & Blogging
      • (Giving) Presentations & Talks
      • Awesome Resources
      • Fonts
      • KB Meta

    Post Exploitation

    • General PostEx Options
    • PostEx Docs

    As the name implies, everything after the exploit lands is “post-exploitation.” It’s not what exploit you use, it’s what you do with it.

    General PostEx Options

    • Steal data
    • Move laterally
    • Make changes
    • Persistence

    PostEx Docs

    • Linux
    • Windows
    • Reverse Shells

    Updated: October 26, 2024

    • Matir's Blog
    • Feed
    © 2024 Matir. Powered by Jekyll & Minimal Mistakes.