After a successful exploitation, one of the most significant steps in attacking a system is post-exploitation. If post-exploitation activities are confined with the better cycle of observe-orient-decide-act, further attacks will be more difficult. We built a python script, MetDEC, based on the ideas of spotting metasploit payloads and applying a concept of military deception to detect, mislead, and neutralize metasploit post-exploitation activities.
winappdbg and psutil
- copy metdec folder into c:
- run help
python metdec.py -h
- run
python metdec.py
- If you want to stop execution, press ctrl+c