Zer0Byte

Geekiest Techno News

Linux/unix & Windows Post-explotation Commands

Ok geeks, @mubix from Room362.com compiled a list of linux and windows commands on google docs that can be useful after eheem eheem 😛 tunneling into someone’s computer. These commands listed are normal commands but most of the time they are not mentioned or posted by penetration testers. Really a good Compilation.

  • Linux Post-Explotation Commands

https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US

  •  Windows Post Exploitation:

https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US

All Credit Goes to @mubix (Rob Fuller)

Source

Related Links