Please disable your adblock and script blockers to view this page

Bashark- Post Exploitation Toolkit Written in Pure Bash

.



Bashark- Post Exploitation Toolkit Written in Pure Bash

Bashark aids Pentesters and Security Researchers during the post-exploitation phase of security audits.

Usage

To launch Bashark on compromised host, simply source the bashark.sh script from terminal:
$ source bashark.sh Then type help to see Bashark’s help menu

Features

  • Single Bash script
  • Lightweight and fast
  • Multi-platform: Unix, OSX, Solaris etc.
  • No external dependencies
  • Immune to heuristic and behavioural analysis
  • Built-in aliases of often used shell commands
  • Extends system shell with post-exploitation oriented functionalities
  • Stealthy, with custom cleanup routine activated on exit
  • Easily extensible (add new commands by creating Bash functions)
  • Full tab completion

See Demo here

Download Bashark

..
..

Post a Comment

[blogger]

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget