Post exploitation toolkit
Bashark aids pentesters and security researchers during the post-exploitation phase of security audit.
To launch this tool on compromised host, simply source the bashark.sh
script from terminal:
$ source bashark.sh
Then type help
to see the help menu
This software is under MIT License