PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A document that helps inform red team planning by contrasting against the very specific red team style described in Red Teams.
An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.
CTF toolkit for rapid exploit development and prototyping.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
Charlotte is an undetected C++ shellcode launcher for executing shellcode with stealth.