From 2f4bfc18a378ae6ff5c31f70d5e9e62080577316 Mon Sep 17 00:00:00 2001 From: Caleb Stewart Date: Wed, 2 Jun 2021 21:14:24 -0400 Subject: [PATCH] Added screenshot and asciinema recording to README --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index 98013fb..cc5a396 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,7 @@ # pwncat +![Multiplatform and Multisesson](https://user-images.githubusercontent.com/7529189/120570796-e5c94780-c3e6-11eb-824a-67cdc5f04279.png) + pwncat is a post-exploitation platform ~~for Linux targets~~. It started out as a wrapper around basic bind and reverse shells and has grown from there. It streamlines common red team operations while staging code from your attacker @@ -10,6 +12,8 @@ to support multiple platforms. Currently, there is alpha support for Windows targets. Please see the latest [documentation] for details on how to use pwncat with a Windows target. +To see pwncat in action, you can check out this asciinema recording: https://asciinema.org/a/wTUDFztq6Fb9ttWYBfBpPf0JN + pwncat intercepts the raw communication with a remote shell and allows the user to perform automated actions on the remote host including enumeration, implant installation and even privilege escalation.