Offensive Security
proxy

Other Tags in this Category

FEATURED

Showcase your innovative cybersecurity solution to our dedicated audience of security professionals.

Reach out!

NEW

Open-source Java application for creating proxies for traffic analysis & modification.

A free and open source C2 and proxy for penetration testers

Chameleon aids in evading proxy categorization to bypass internet filters.

A penetration testing tool for intercepting SSH connections and logging plaintext passwords.

Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.

PoshC2 Logo

PoshC2

0 (0)

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.