PoshC2 Logo

PoshC2

0
Free
Visit Website

PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.

FEATURES

ALTERNATIVES

A cross-platform web fuzzer written in Nim

Python Exploit Development Assistance for GDB with enhanced debugging features and commands for exploit development.

A tool for detecting and taking over subdomains with dead DNS records

A modern post-exploitation command and control framework with a client-server architecture and extensibility features.

A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.

Find RCE gadgets for CTF pwn challenges with ease.

A Python script for creating a cohesive and up-to-date penetration testing framework.

A C2 profile generator for Cobalt Strike designed to enhance evasion.