CyberArsenal

Welcome to the forum. We focus on computer and network security as well as reverse engineering - you should sign up to see content and better yet participate. There is no payment, credits system, reply-to-reveal, or any of that here. We want quality over quantity. This is an experiment and the idea is to build a good natured and mature/professional community. Please be kind and share! Thanks.

Post-Exploitation C2

Related to command and control, pivoting, and persistence

Havoc Framework C2

Information about the Havoc C2
Threads
5
Messages
16
Threads
5
Messages
16

Sliver C2

Sliver is an open source cross-platform adversary emulation/red team framework.
Threads
7
Messages
10
Threads
7
Messages
10

CobaltStrike C2

CobaltStrike went from adversary emulation to adversary.
Threads
9
Messages
140
Threads
9
Messages
140

Brute Ratel C2

C2 for deployment to windows (yep why should you get 4C's?) C2!
Threads
5
Messages
134
Threads
5
Messages
134

Other C2

Other command and control post-compromise software.
Threads
14
Messages
55
Threads
14
Messages
55
  • zen
Top