PoshC2 documentation 31 Mar 2022 We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below. Read more
Introducing PoshC2 v8.0 30 Mar 2022 We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and... Read more
Introducing RunOF - Arbitrary BOF tool 2 Mar 2022 A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These... Read more
Introducing PoshC2 v7.0 20 Aug 2020 There have been some big improvements and new features added to PoshC2 and we’re excited to announce the... Read more
PoshC2 7 Aug 2020 PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral... Read more
Introducing PoshC2 v6.0 18 May 2020 We are pleased to release the latest version of PoshC2 – v6.0. Version 6.0 includes a number of significant... Read more
Introducing SharpSocks v2.0 14 Nov 2019 It has been over a year since we released the first version of SharpSocks, our proxy-aware reverse HTTP... Read more
Introducing PoshC2 v5.0 12 Nov 2019 PoshC2 v5.0 is here and there are significant changes and improvements that we’re very excited to reveal! There’s... Read more
Introducing Scrounger - iOS and Android mobile application penetration... 23 Aug 2018 Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. ... Read more
Introducing Prowl 5 Jun 2018 Prowl was initially designed as an in house tool to aid engagements where there’s a requirement to capture... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*