Added screenshot and asciinema recording to README

This commit is contained in:
Caleb Stewart 2021-06-02 21:14:24 -04:00 committed by GitHub
parent 25b9d0a6ba
commit 2f4bfc18a3
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 4 additions and 0 deletions

View File

@ -1,5 +1,7 @@
# pwncat
![Multiplatform and Multisesson](https://user-images.githubusercontent.com/7529189/120570796-e5c94780-c3e6-11eb-824a-67cdc5f04279.png)
pwncat is a post-exploitation platform ~~for Linux targets~~. It started out as a
wrapper around basic bind and reverse shells and has grown from there. It
streamlines common red team operations while staging code from your attacker
@ -10,6 +12,8 @@ to support multiple platforms. Currently, there is alpha support for Windows
targets. Please see the latest [documentation] for details on how to use
pwncat with a Windows target.
To see pwncat in action, you can check out this asciinema recording: https://asciinema.org/a/wTUDFztq6Fb9ttWYBfBpPf0JN
pwncat intercepts the raw communication with a remote shell and allows the
user to perform automated actions on the remote host including enumeration,
implant installation and even privilege escalation.