PoshC2

A proxy aware C2 framework.

Visit Website →

Overview

PoshC2 is an open-source, proxy-aware command and control (C2) framework designed for penetration testers and red teamers. It facilitates post-exploitation and lateral movement activities. PoshC2 is primarily written in Python and utilizes PowerShell, C#, and Python implants, enabling it to operate across various operating systems.

✨ Key Features

  • Proxy-aware C2 communication
  • Cross-platform support (Windows, Linux, macOS)
  • Modular and extensible architecture
  • Variety of payloads (PowerShell, C#, Python)
  • Encrypted communications
  • Docker support for easy deployment

🎯 Key Differentiators

  • Strong focus on PowerShell-based tradecraft
  • Proxy-aware capabilities for complex networks
  • Extensible and modular design

Unique Value: Provides a flexible and powerful open-source C2 framework with a focus on PowerShell, making it highly effective for post-exploitation in Windows environments.

🎯 Use Cases (4)

Red team operations Penetration testing Post-exploitation Lateral movement

✅ Best For

  • Establishing C2 in environments with proxy servers
  • Managing compromised hosts across different operating systems

💡 Check With Vendor

Verify these considerations match your specific requirements:

  • Initial vulnerability scanning
  • Web application testing

🏆 Alternatives

Empire Sliver Mythic

Offers a more PowerShell-centric approach compared to other open-source C2 frameworks, with robust proxy-aware features.

💻 Platforms

Desktop

💰 Pricing

Contact for pricing
Free Tier Available

Free tier: PoshC2 is completely free and open-source.

Visit PoshC2 Website →