Added screenshot and asciinema recording to README

This commit is contained in:
Caleb Stewart 2021-06-02 21:14:24 -04:00 committed by GitHub
parent 25b9d0a6ba
commit 2f4bfc18a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 0 deletions

View File

@ -1,5 +1,7 @@
# pwncat # pwncat
![Multiplatform and Multisesson](https://user-images.githubusercontent.com/7529189/120570796-e5c94780-c3e6-11eb-824a-67cdc5f04279.png)
pwncat is a post-exploitation platform ~~for Linux targets~~. It started out as a pwncat is a post-exploitation platform ~~for Linux targets~~. It started out as a
wrapper around basic bind and reverse shells and has grown from there. It wrapper around basic bind and reverse shells and has grown from there. It
streamlines common red team operations while staging code from your attacker streamlines common red team operations while staging code from your attacker
@ -10,6 +12,8 @@ to support multiple platforms. Currently, there is alpha support for Windows
targets. Please see the latest [documentation] for details on how to use targets. Please see the latest [documentation] for details on how to use
pwncat with a Windows target. pwncat with a Windows target.
To see pwncat in action, you can check out this asciinema recording: https://asciinema.org/a/wTUDFztq6Fb9ttWYBfBpPf0JN
pwncat intercepts the raw communication with a remote shell and allows the pwncat intercepts the raw communication with a remote shell and allows the
user to perform automated actions on the remote host including enumeration, user to perform automated actions on the remote host including enumeration,
implant installation and even privilege escalation. implant installation and even privilege escalation.