Via room362.com (Rob Fuller)
Rob Fuller has created three documents in Google Docs with a list of commands that can be used to gather information during the post exploitation phase in Windows, Linux and OSX systems.
I am sure the lists are going to be really useful for many people with the help of some Metasploit Scripting skills.
Unix Post Exploitation
Windows Post Exploitation
OSX Post Exploitation