PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.
FEATURES
ALTERNATIVES
A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.
Cutting-edge open-source security tools for adversary simulation and threat hunting.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
Open source penetration testing tool for detecting and exploiting command injection vulnerabilities.
A script to enumerate Google Storage buckets and determine access and privilege escalation
A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.
PINNED

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.