Awesome
<h1 align="center"> Bashark 2.0 </h1> <br> <p align="center"> <a> <img alt="Bashark" title="Bashark" src="logo.svg" width="450"> </a> </p> <p align="center"> Post exploitation toolkit </p>
Bashark aids pentesters and security researchers during the post-exploitation phase of security audit.
Usage
To launch this tool on compromised host, simply source the bashark.sh
script from terminal:
$ source bashark.sh
Then type help
to see the help menu
License
This software is under MIT License