{ "type": "bundle", "id": "bundle--01108eb1-ac00-4f55-b94a-f0c876521716", "spec_version": "2.0", "objects": [ { "labels": [ "tool" ], "x_mitre_platforms": [ "Windows", "Linux", "macOS" ], "x_mitre_domains": [ "enterprise-attack" ], "x_mitre_aliases": [ "PoshC2" ], "object_marking_refs": [ "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168" ], "type": "tool", "id": "tool--4b57c098-f043-4da2-83ef-7588a6d426bc", "created": "2019-04-23T12:31:58.125Z", "x_mitre_version": "1.3", "external_references": [ { "source_name": "mitre-attack", "external_id": "S0378", "url": "https://attack.mitre.org/software/S0378" }, { "source_name": "GitHub PoshC2", "url": "https://github.com/nettitude/PoshC2_Python", "description": "Nettitude. (2018, July 23). Python Server for PoshC2. Retrieved April 23, 2019." } ], "x_mitre_deprecated": false, "revoked": false, "description": "[PoshC2](https://attack.mitre.org/software/S0378) is an open source remote administration and post-exploitation framework that is publicly available on GitHub. The server-side components of the tool are primarily written in Python, while the implants are written in [PowerShell](https://attack.mitre.org/techniques/T1059/001). Although [PoshC2](https://attack.mitre.org/software/S0378) is primarily focused on Windows implantation, it does contain a basic Python dropper for Linux/macOS.(Citation: GitHub PoshC2)", "modified": "2022-06-03T17:45:36.186Z", "created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5", "name": "PoshC2", "x_mitre_attack_spec_version": "2.1.0", "x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5" } ] }