CyberArsenal

Welcome to the forum. We focus on computer and network security as well as reverse engineering - you should sign up to see content and better yet participate. There is no payment, credits system, reply-to-reveal, or any of that here. We want quality over quantity. This is an experiment and the idea is to build a good natured and mature/professional community. Please be kind and share! Thanks.

Post-Exploitation C2

Related to command and control, pivoting, and persistence

Havoc Framework C2

Information about the Havoc C2
Threads
5
Messages
15
Threads
5
Messages
15
  • zen

Sliver C2

Sliver is an open source cross-platform adversary emulation/red team framework.
Threads
7
Messages
7
Threads
7
Messages
7

CobaltStrike C2

CobaltStrike went from adversary emulation to adversary.
Threads
2
Messages
35
Threads
2
Messages
35

Brute Ratel C2

C2 for deployment to windows (yep why should you get 4C's?) C2!
Threads
3
Messages
84
Threads
3
Messages
84

Other C2

Other command and control post-compromise software.
Threads
6
Messages
9
Threads
6
Messages
9
Top