Adversary simulation attacks.

Control Pack C2
Evasion and bypass in userland.

Ready to give it a spin?

Scroll Down

Our Pricing Options

Control Pack is the most advanced post-exploitation C2 framework with agents designed with stealth and EDR/AV evasion at its core using the latest updated techniques to bypass modern antivirus (AVs) and endpoint detection and response systems (EDRs).

A full license of Control Pack also includes access to monthly updates and technical support.


Do you need a quote? Contact us via email

⦁ Delivery method: By email. Licenses will be sent to the email used during the purchase.
⦁ Licenses already activated cannot be transferred.
⦁ Once the order is confirmed and the product is digitally delivered, refunds are not issued.

Control Pack
Framework

Evasion, bypass and full remote control in userland

  • ✖ Bundle discount price
  • ✔ Multi-agents & Persistance
  • ✔ Bypass & Stealth
  • ✔ Phishing campaigns
  • ✔ Technical support
  • ✔ 1-year license
cards
Powered by paypal

Control Pack
+ Exploit Pack

Bundle Control Pack C2 with Exploit Pack Framework

  • ✔ Discounted bundle price
  • ✔ Control Pack license
  • ✔ Exploit Pack license
  • ✔ Tools integration
  • ✔ Technical support
  • ✔ 1-year license for each
cards
Powered by paypal
App Screenshots


Take your adversary simulations and Red Team operations to the next level.

Control Pack has been designed to enable Red teams and cyber security professionals to simulate the attacks and tactics of a real threat inside and outside of an IT network. It has an easy-to-use graphical interface that will get you running in no time and customizable agents that can be tailored to your specific needs. Control Pack at its core is a fully featured C2 that will allow you conduct attack simulations and bypass the most current AVs and EDRs.

App Screenshots


Browser pivoting

sample-image
Make use of it to get around two-factor authentication, phishing campaigns and reconnaissance.


Covert communication

sample-image
Obfuscate your communication to remain under the radar, switch between HTTP, HTTPS and Socket type of agents.


Reconnaissance and Post-exploitation

sample-image
Discovers client-side software and version information that your target uses to identify potential known vulnerabilities. Make use of Control Pack agents to log keystrokes, take screenshots, download files, and execute other payloads.


Technical support and Training

sample-image
Never get stuck, your license includes technical support and consultation during your next project. We are here to help you achieve results and improve your Red Teaming capabilities.


Trusted by technical teams at companies of all sizes around the globe

Author image

What our clients say about Control Pack:

"Control Pack has been supporting our Cyber Security needs since the beginning. Their understanding of the relevance of staying current with the latest trends in attacks is crucial and their online training and technical support have definitely been an added value." - R. De Vries - Red Team Lead.