Cyber offensive tools

Arsenal of software used to cover  any of the full Cyber Kill Chain such as :

  • Reconnaissance – Harvesting email addresses, personal information on target, credentials, etc…
  • Weaponization – Coupling an exploit with a backdoor into a deliverable payload
  • Delivery – Delivering weaponized bundles to the victim via email, web, USB, etc…
  • Exploitation – Exploiting a vulnerability to execute code on a victim’s system
  • Installation – Installing malware on the asset
  • Command & Control (C2): Command channel for remote manipulation of the victim
  • Actions on objectives: Eavesdropping on target, data manipulation or destructive actions