Harpoon Logo

Harpoon

0
Free
Visit Website

A collection of tips and tricks for container and container orchestration hacking. TODO: write documentation

FEATURES

ALTERNATIVES

Preparation process for participating in the Pacific Rim CCDC 2015.

A proof-of-concept obfuscation toolkit for C# post-exploitation tools, designed to conceal malicious activities from detection.

A front-end JavaScript toolkit for creating DNS rebinding attacks

A C2 profile generator for Cobalt Strike designed to enhance evasion.

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

An open-source penetration testing framework for social engineering with custom attack vectors.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.