In many cases once you have exploited a device you don’t know exactly what to do or how to go on. Maybe you have many payloads available and after trying all of them they don't work because of the architecture of the device. Even more in limited environments like embedded devices, for instance. The result is a waste of time and results. Post-exploitation is a critical phase and that’s why I would like to create a generic interface to make it easy, automatic and direct for anyone to execute postexploitation functions in whatever device they are trying to pentest. And it will not depend on the architecture of the device. At the same time I will try to make a project very scalable and modular to ease future improvements on it and avoid some of the current problems.





  • wvu