After you are done with exploitation you have to perform some post-exploitation attacks to maintain persistent access to the system according to your need so for that also Fsociety provides some tools such as Shell Checker, POET, Weema.
9. Contributors – Contain a contributors list.
10...