Bashark - Bash Post Exploitation Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
2018-10-24 21:20:57 Author: www.kitploit.com(查看原文) 阅读量:206 收藏

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits.

Usage
To launch Bashark on compromised host, simply source the bashark.sh script from terminal: $ source bashark.sh Then type help to see Bashark's help menu

Features

  • Single Bash script
  • Lightweight and fast
  • Multi-platform: Unix, OSX, Solaris etc.
  • No external dependencies
  • Immune to heuristic and behavioural analysis
  • Built-in aliases of often used shell commands
  • Extends system shell with post-exploitation oriented functionalities
  • Stealthy, with custom cleanup routine activated on exit
  • Easily extensible (add new commands by creating Bash functions)
  • Full tab completion

Demo

Bashark - Bash Post Exploitation Toolkit Bashark - Bash Post Exploitation Toolkit Reviewed by Lydecker Black on 9:47 AM Rating: 5


文章来源: https://www.kitploit.com/2018/10/bashark-bash-post-exploitation-toolkit.html
如有侵权请联系:admin#unsafe.sh