Key Features
Voodoo is a platform for covert interactive cyber operations creating a force multiplier in your team's offensive operations

Stealth
Safely and intuitively pivot within the network using our fully automated OPSEC early warning system

Lateral Movement
Infinite Pivoting and Chaining enabling access to systems otherwise inaccessible from the Internet
In Memory Only
Memory Only Scripting & Binaries Python, C#, Powershell, .NET PEs, DLLs, ELFs, SOs, Mach-Os, Bundles
Cross Platform
MacOS, Linux, Windows (x86), Andriod, iOS, IoT (ARM)
Collaboration
Multi-user interface enabling multi-threading and team operations
Armory
Curated "munitions" of easily upload-able proven exploitation modules


Enterprise Post Exploitation Platform
Voodoo had teamwork in mind when it came to designing the user interface. Multiple operators can interact with the same agents simultaneously.
Voodoo






IoT and OT support
Designed from the ground up to be stealthy, stable, and versatile. Chain agents together through a series of call-back (reverse) and call-in (connect) payloads providing access deep into target networks to information systems (e.g. SCADA networks, CDEs/Cardholder Data Environments, internal databases, etc.)
Enterprise, Professional, & Community Edition
A variety of offerings and information to suit your needs


Train as you fight
Study the methods of the adversary and apply it to real-world scenarios via hands-on labs.
Let S2 show you what's possible
You deserve an expert security partner not just another service provider
- Decades of experience securing Federal Enterprises and Fortune 50
- Former NSA Operators skilled in the Adversary arts
- Full scope Security-as-a-Service. Press the easy button.