Bashark- Post Exploitation Toolkit Written in Pure Bash












Bashark- Post Exploitation Toolkit Written in Pure Bash


Bashark aids Pentesters and Security Researchers during the post-exploitation phase of security audits.



Usage


To launch Bashark on compromised host, simply source the bashark.sh script from terminal:
$ source bashark.sh Then type help to see Bashark’s help menu



Features



  • Single Bash script

  • Lightweight and fast

  • Multi-platform: Unix, OSX, Solaris etc.

  • No external dependencies

  • Immune to heuristic and behavioural analysis

  • Built-in aliases of often used shell commands

  • Extends system shell with post-exploitation oriented functionalities

  • Stealthy, with custom cleanup routine activated on exit

  • Easily extensible (add new commands by creating Bash functions)

  • Full tab completion

See Demo here


Download Bashark



Bashark- Post Exploitation Toolkit Written in Pure Bash Bashark- Post Exploitation Toolkit Written in Pure Bash Reviewed by Unknown on 9:11 PM Rating: 5

No comments:

Powered by Blogger.

Action Required

Sorry !!Friends We are Earn Some Money from Ads and Manage Our Site.If You Like To Support US Please Disable ADS Blocker and Continue Reading. Thank You

×

Thank 4R Your Support