#Proxy
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: 54.36.14.217
Port: 1414
Secret: 42f4d2c4997e6668c910c2892f8d9a72
Country: 🇫🇷 France
City: Paris
🆔 @LearnExploit
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: 54.36.14.217
Port: 1414
Secret: 42f4d2c4997e6668c910c2892f8d9a72
Country: 🇫🇷 France
City: Paris
🆔 @LearnExploit
#Proxy
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: 159.69.45.12
Port: 4443
Secret: bbf55e7f2529a0814a194a757940de68
Country: 🇩🇪 Germany
City: Gunzenhausen (Frickenfelden)
🆔 @LearnExploit
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: 159.69.45.12
Port: 4443
Secret: bbf55e7f2529a0814a194a757940de68
Country: 🇩🇪 Germany
City: Gunzenhausen (Frickenfelden)
🆔 @LearnExploit
#Proxy
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: thunderdog.ddnsking.com
Port: 8898
Secret: 8c7168dc0ed683acc2582f131246de78
Country: 🇩🇪 Germany
City: Nuremberg
🆔 @LearnExploit
#0Day_Today_Learn_Exploit_Zero_World_Dark_web
#Armia_Evil
Server: thunderdog.ddnsking.com
Port: 8898
Secret: 8c7168dc0ed683acc2582f131246de78
Country: 🇩🇪 Germany
City: Nuremberg
🆔 @LearnExploit
PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement.
PoshC2 is primarily written in Python3 and follows a modular format to enable users to add their own modules and tools, allowing an extendible and flexible C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python2/Python3 implants with payloads written in PowerShell v2 and v4, C++ and C# source code, a variety of executables, DLLs and raw shellcode in addition to a Python2/Python3 payload. These enable C2 functionality on a wide range of devices and operating systems, including Windows, *nix and OSX.
LearnExploit
#Payload #C2 #Proxy #Aware
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4⚡2❤1