"Post" refers to , which are used after you have already gained a session on a target host. These modules are used to gather information, such as passwords or hashes (digital "keys"), from the compromised system. Common uses:
Extract sensitive configuration keys from the Windows registry. Clave MatSploit
Use modules to search for stored passwords or SSH keys. "Post" refers to , which are used after