PoshC2 Logo

PoshC2

0
Free
Visit Website

PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.

FEATURES

ALTERNATIVES

A blog post about abusing exported functions and exposed DCOM interfaces for pass-thru command execution and lateral movement

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

Phrack Magazine is a digital magazine that focuses on computer security and hacking, featuring articles, interviews, and tutorials on various topics related to computer security.

Maintaining account persistence via XSS and Oauth

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang for efficient and secure communication.

Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.

Pwndrop is a self-deployable file hosting service for red teamers, allowing easy upload and sharing of payloads over HTTP and WebDAV.

A tool for detecting and exploiting Server-Side Template Injection (SSTI) vulnerabilities