
| Names | PoshC2 | |
| Category | Tools | |
| Type | Backdoor | |
| Description | PoshC2 is an open source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in Python, while the implants are written in PowerShell. Although PoshC2 is primarily focused on Windows implantation, it does contain a basic Python dropper for Linux/macOS. | |
| Information | <https://github.com/nettitude/PoshC2/> <https://www.prodefence.org/poshc2-red-teaming-post-exploitation-tool/> <https://www.fireeye.com/blog/threat-research/2018/12/overruled-containing-a-potentially-destructive-adversary.html> | |
| MITRE ATT&CK | <https://attack.mitre.org/software/S0378/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/win.poshc2> | |
| AlienVault OTX | <https://otx.alienvault.com/browse/pulses?q=tag:poshc2> | |
Last change to this tool card: 14 May 2020
Download this tool card in JSON format
Previous: PoshAdvisor
Next: POSHSPY
| Changed | Name | Country | Observed | ||
APT groups | |||||
| APT 33, Elfin, Magnallium | 2013-Apr 2024 | ||||
1 group listed (1 APT, 0 other, 0 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||