Empire Project - a PowerShell and Python-based Empire is a post-exploitation framework that includes a variety of modules for command and control, keylogging, and lateral movement
Pupy - a Python-based remote administration tool that allows for persistent access to a compromised system
Cobalt Strike - a commercial post-exploitation tool that includes command and control capabilities, keylogging, and lateral movement
Sliver - a macOS, Linux, and Windows client-server based payload generator that uses PowerShell and Python
Maltego - Proprietary software for open-source intelligence and forensics, enabling users to mine and gather information from various sources.
Spiderfoot - An open-source intelligence automation tool that automatically queries over 100 public data sources to gather intelligence on IP addresses, domain names, email addresses, names, and more.
OSINT - A framework for performing OSINT tasks to find information about a target.
Mimikatz - A tool used to extract Windows credentials from memory, Windows registry hives, and Windows authentication packages.
LaZagne - A tool used to retrieve passwords stored on a local computer. It supports more than 200 applications.
forkatz - A .NET security tool that can be used to enumerate and extract various types of Windows credentials, including the DPAPI Master Keys and Windows Vault credentials.
Pypykatz - A tool used to extract Windows credentials from memory and various Windows artifacts. It supports both live and offline analysis.