Skip to content

Post-Exploitation

Post-exploitation modules extend beacon capabilities beyond basic command execution. These modules implement advanced techniques for process injection, privilege escalation, credential harvesting, Active Directory attacks, and lateral movement across the target environment.

In This Section