PoshC2 Logo

PoshC2

0
Free
Visit Website

PoshC2 is a proxy aware C2 framework used for penetration testing, red teaming, post-exploitation, and lateral movement, featuring a modular format, cross-platform support, and highly configurable payloads. It provides a range of out-of-the-box implants and payloads, including PowerShell/C# and Python3, with frequent updates to bypass Anti-Virus products. The framework offers auto-generated Apache Rewrite rules, modular format for custom modules, notifications, and comprehensive logging with timestamped actions and responses. PoshC2 supports multiple team members, has a client/server format, and ensures encrypted communications, protecting the confidentiality and integrity of C2 traffic.

FEATURES

ALTERNATIVES

A subdomain enumeration tool for bug hunting and pentesting

A collection of Microsoft PowerShell modules for penetration testing purposes.

An image with commonly used tools for creating a pentest environment easily and quickly, with detailed instructions for launching in a VPS.

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

A tool that scans for accessibility tools backdoors via RDP

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

Introduction to using GScript for Red Teams

Chameleon aids in evading proxy categorization to bypass internet filters.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved