Skip content

11 20 29 results

Filter by

  • Logparser Query Files

    We have created a set of queries for sysmon log files that will process each of the Event...

    Read more
  • Introducing MalSCCM

    During red team operations the goal is often to compromise a system of high value. These systems will...

    Read more
  • PoshC2 documentation

    We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/. For your convenience, we have also embedded it below.

    Read more
  • Introducing PoshC2 v8.0

    We’re thrilled to announce a new release of PoshC2 packed full of new features, modules, major improvements, and...

    Read more
  • Introducing RunOF - Arbitrary BOF tool

    A few years ago, a new feature was added to Cobalt Strike called “Beacon Object Files” (BOFs). These...

    Read more
  • Introducing PoshC2 v7.0

    There have been some big improvements and new features added to PoshC2 and we’re excited to announce the...

    Read more
  • PoshC2

    PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral...

    Read more
  • Introducing PoshC2 v6.0

    We are pleased to release the latest version of PoshC2 – v6.0. Version 6.0 includes a number of significant...

    Read more
  • Introducing SharpSocks v2.0

    It has been over a year since we released the first version of SharpSocks, our proxy-aware reverse HTTP...

    Read more
  • Introducing PoshC2 v5.0

    PoshC2 v5.0 is here and there are significant changes and improvements that we’re very excited to reveal!  There’s...

    Read more

Error

Error

No results found

No results found that match your query

Loading results