hacktricks/post-exploitation.md

44 lines
4.1 KiB
Markdown
Raw Normal View History

{% hint style="success" %}
Jifunze & zoezi AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**Mafunzo ya HackTricks AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Jifunze & zoezi GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**Mafunzo ya HackTricks GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Support HackTricks</summary>
2022-04-28 16:01:33 +00:00
* Angalia [**mpango wa michango**](https://github.com/sponsors/carlospolop)!
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
2022-04-28 16:01:33 +00:00
2022-05-01 16:32:23 +00:00
## **L00t ya Mtaani**
* [**PEASS-ng**](https://github.com/carlospolop/PEASS-ng): Hizi script, zaidi ya kutafuta vectors za PE, zitatafuta habari nyeti ndani ya mfumo wa faili.
* [**LaZagne**](https://github.com/AlessandroZ/LaZagne): Mradi wa **LaZagne** ni programu huru inayotumika **kupata nywila nyingi** zilizohifadhiwa kwenye kompyuta ya ndani. Kila programu inahifadhi nywila zake kwa kutumia mbinu tofauti (maandishi wazi, APIs, algoritimu za desturi, maktaba za data, n.k.). Zana hii imeendelezwa kwa lengo la kupata nywila hizi kwa programu zinazotumiwa sana.
2024-02-11 02:13:58 +00:00
## **Huduma za Nje**
* [**Conf-Thief**](https://github.com/antman1p/Conf-Thief): Moduli hii itaunganisha kwenye API ya Confluence kwa kutumia token ya ufikiaji, kuuza kwa PDF, na kupakua nyaraka za Confluence ambazo lengo ana ufikiaji.
* [**GD-Thief**](https://github.com/antman1p/GD-Thief): Zana ya Timu Nyekundu ya kuchukua faili kutoka kwa Google Drive ya lengo ambayo wewe (mshambuliaji) una ufikiaji, kupitia API ya Google Drive. Hii ni pamoja na faili zote zilizoshirikiwa, faili zote kutoka kwa madereva yaliyoshirikiwa, na faili zote kutoka kwa madereva ya kikoa ambayo lengo ana ufikiaji.
* [**GDir-Thief**](https://github.com/antman1p/GDir-Thief): Zana ya Timu Nyekundu ya kuchukua Mwongozo wa Watu wa Google wa shirika la lengo ambalo una ufikiaji, kupitia API ya Watu wa Google.
* [**SlackPirate**](https://github.com/emtunc/SlackPirate)**:** Hii ni zana iliyoendelezwa kwa Python ambayo hutumia Slack APIs ya asili kutoa habari 'zinazovutia' kutoka kwa nafasi ya kazi ya Slack ikitoa token ya ufikiaji.
* [**Slackhound**](https://github.com/BojackThePillager/Slackhound): Slackhound ni zana ya mstari wa amri kwa timu nyekundu na buluu kufanya upelelezi haraka wa nafasi ya kazi/shirika la Slack. Slackhound hufanya ukusanyaji wa watumiaji wa shirika, faili, ujumbe, n.k. kuwa rahisi kutafutika na vitu vikubwa huandikwa kwenye CSV kwa mapitio nje ya mtandao.
2022-05-01 16:32:23 +00:00
{% hint style="success" %}
Jifunze & zoezi AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**Mafunzo ya HackTricks AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Jifunze & zoezi GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**Mafunzo ya HackTricks GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
<summary>Support HackTricks</summary>
2022-04-28 16:01:33 +00:00
* Angalia [**mpango wa michango**](https://github.com/sponsors/carlospolop)!
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Shiriki mbinu za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}