PoshC2 Logo

PoshC2

0
Free
Visit Website

PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.

FEATURES

ALTERNATIVES

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

Generates randomized C2 profiles for Cobalt Strike to evade detection.

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

A blog post discussing the often overlooked dangers of CSV injection in applications.

APT Simulator is a tool for simulating a compromised system on Windows.

A powerful tool for hiding the true location of your Teamserver, evading detection from Incident Response, redirecting users, blocking specific IP addresses, and managing Malleable C2 traffic in Red Team engagements.

A simple, fast web crawler for discovering endpoints and assets in a web application

RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.

PINNED