Exploit Pack - Documentation
  • Exploit Pack
    • Installation guide
    • License Activation
    • First steps
    • Running the network mapper
    • AutoPwn
    • UTF-8 Locator
    • Notepad
    • Reverse shell - One-liners
    • Hex Editor
    • GDB Connector
    • Log your actions
    • Exploits customization
    • Add a Proxy to Exploit Pack
    • Using Reverse Shells
    • XSS Agent - Tunnel
    • Advanced DLL Injections
    • VBS/PS Agent - Remote Access
    • VBS Agent Wizard
    • Exploit Development I
    • Exploit Development II
    • Exploit Development III
  • Control Pack
    • Installation guide
    • License Activation
    • First Steps: Configure Control Pack
    • Launch your first agent
    • Control Pack agent's code
    • Agent connection
    • Java Agent
    • Browser Agent
    • VBS Agent
    • .NET Profiler DLL Agent
    • How to use the DLL + UnHooker Agent
    • .NET shell
    • Python Shell
  • Kernel Pack
Powered by GitBook
On this page

Was this helpful?

  1. Exploit Pack

Notepad

PreviousUTF-8 LocatorNextReverse shell - One-liners

Last updated 1 year ago

Was this helpful?

‌While doing a pentest, besides using the "Targets" tab to take notes on each asset being tested, there was a need to add some general notes for the whole pentest or project.

The built-in notepad is particularly useful if your pentest lasts more than a few days or if you have several targets that use different networks. ‌

As you can see in the screenshot below, in the toolbar, click on the button "Notepad", hide it from the rest of the Windows or Save the current work. Simple, and useful :-)