Exploitation Modules
Modules for controlled exploitation and post-exploitation.
Exploitation Modules
These modules handle controlled exploitation within authorized scope.
mcp-protocol-ai-core
The AI core that powers intelligent exploitation decisions.
z2e exploit auto --target example.com --scope authorized.txtFeatures:
- Payload selection optimization
- Evasion technique adaptation
- Success probability scoring
payload-generator
Generate context-aware payloads for various vulnerability types.
z2e exploit payload --type reverse_shell --platform linuxSupported Types:
- Reverse shells (bash, python, php, etc.)
- Web shells
- Privilege escalation scripts
- Persistence mechanisms
evasion-engine
IDS/IPS evasion capabilities for payload delivery.
z2e exploit deliver --payload shell.php --evasion aggressiveTechniques:
- Traffic fragmentation
- Encoding/obfuscation
- Protocol manipulation
- Timing-based evasion
post-exploit-framework
Post-exploitation capabilities for authorized testing.
z2e post --session 1 --module credential_dumpCapabilities:
- Credential harvesting
- Lateral movement
- Persistence establishment
- Data exfiltration simulation