Skip content

11 20 27 results

Filter by

  • PoshC2 documentation

    We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below.

    Read more
  • Introducing PoshC2 v8.0

    We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and...

    Read more
  • Introducing RunOF - Arbitrary BOF tool

    A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These...

    Read more
  • Introducing PoshC2 v7.0

    There have been some big improvements and new features added to PoshC2 and we’re excited to announce the...

    Read more
  • PoshC2

    PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral...

    Read more
  • Introducing PoshC2 v6.0

    We are pleased to release the latest version of PoshC2 – v6.0. Version 6.0 includes a number of significant...

    Read more
  • Introducing SharpSocks v2.0

    It has been over a year since we released the first version of SharpSocks, our proxy-aware reverse HTTP...

    Read more
  • Introducing PoshC2 v5.0

    PoshC2 v5.0 is here and there are significant changes and improvements that we’re very excited to reveal!  There’s...

    Read more
  • Introducing Scrounger - iOS and Android mobile application penetration...

    Scrounger is a modular tool designed to perform the routine tasks required during a mobile application security assessment. ...

    Read more
  • Introducing Prowl

    Prowl was initially designed as an in house tool to aid engagements where there’s a requirement to capture...

    Read more

Error

Error

No results found

No results found that match your query

Loading results