Post Exploitation Command Lists: Request to Edit

Wednesday, November 07, 2012

Rob Fuller


The post exploitation command lists: 

Linux/Unix/BSD Post Exploitation:

Windows Post Exploitation:

OSX Post Exploitation:

and the newly added Obsucure Syststem's Post Exploitation:

and Metasploit Post Exploitation:

Have been a weekly upkeep for me with so many… I don't know what to call it, 'undesirable edits' to them. Bad copies, bad pastes, formatting issues and some times deletion or vandalism of the docs.

Anyways, I have finally broken down and removed 'world' editable permissions. Anyone who has these links can still comment and copy the docs, but they can no longer edit them directly.

If you would like to contribute, please shoot me a tweet, a email, a... anything and I will gladly add you to the permissions to edit. Honestly it just became so overwhelming that every time I thought to add something I would cringe away because I know I'd spend most of time fixing them.

Anyway enough of my crying, please if you have stuff to add or are just really good at fixing up formatting, let me know and I'll add you to the editors list.



Cross-posted from Room362

Possibly Related Articles:
Information Security
Hacking Penetration Testing Metasploit Exploits
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.