CyberArsenal

Welcome to the forum. We focus on computer and network security as well as reverse engineering - you should sign up to see content and better yet participate. There is no payment, credits system, reply-to-reveal, or any of that here. We want quality over quantity. This is an experiment and the idea is to build a good natured and mature/professional community. Please be kind and share! Thanks.

  • ⚠️ Even if sourced from us, never blindly trust cracked software. Always utilize isolated environments (like Docker or VMs) without internet access and deny local network access. Thoroughly review scripts before execution to protect not only yourself but also your friends, family, and colleagues. Stay secure! ⚠️
  • For your information, we no longer host files on “ponies.cloud” but on “pwn3rzs.co”.
    So, be careful and do not trust the links on “ponies.cloud” if it should come back (since the registrar has set it "inactive" due to false information from the .cloud top level domain and we consider it gone.) The hosting is not a problem this was just domain registrar nonsense.

Post-Exploitation C2

Related to command and control, pivoting, and persistence

Havoc Framework C2

Information about the Havoc C2
Threads
5
Messages
16
Threads
5
Messages
16

Sliver C2

Sliver is an open source cross-platform adversary emulation/red team framework.
Threads
7
Messages
10
Threads
7
Messages
10

CobaltStrike C2

CobaltStrike went from adversary emulation to adversary.
Threads
12
Messages
180
Threads
12
Messages
180

Brute Ratel C2

C2 for deployment to windows (yep why should you get 4C's?) C2!
Threads
6
Messages
145
Threads
6
Messages
145

Other C2

Other command and control post-compromise software.
Threads
21
Messages
55
Threads
21
Messages
55
Top