Cyber offensive tools
Arsenal of software used to cover any of the full Cyber Kill Chain such as :
- Reconnaissance – Harvesting email addresses, personal information on target, credentials, etc…
- Weaponization – Coupling an exploit with a backdoor into a deliverable payload
- Delivery – Delivering weaponized bundles to the victim via email, web, USB, etc…
- Exploitation – Exploiting a vulnerability to execute code on a victim’s system
- Installation – Installing malware on the asset
- Command & Control (C2): Command channel for remote manipulation of the victim
- Actions on objectives: Eavesdropping on target, data manipulation or destructive actions