CyberArsenal

Welcome to the forum. We focus on computer and network security as well as reverse engineering - you should sign up to see content and better yet participate. There is no payment, credits system, reply-to-reveal, or any of that here. We want quality over quantity. This is an experiment and the idea is to build a good natured and mature/professional community. Please be kind and share! Thanks.

Post-Exploitation C2

Related to command and control, pivoting, and persistence

Havoc Framework C2

Information about the Havoc C2
Threads
5
Messages
15
Threads
5
Messages
15
  • zen

Sliver C2

Sliver is an open source cross-platform adversary emulation/red team framework.
Threads
7
Messages
10
Threads
7
Messages
10

CobaltStrike C2

CobaltStrike went from adversary emulation to adversary.
Threads
8
Messages
129
Threads
8
Messages
129

Brute Ratel C2

C2 for deployment to windows (yep why should you get 4C's?) C2!
Threads
4
Messages
116
Threads
4
Messages
116

Other C2

Other command and control post-compromise software.
Threads
8
Messages
48
Threads
8
Messages
48
  • zen
Top