Key Features

Voodoo is a platform for covert interactive cyber operations creating a force multiplier in your team's offensive operations

Stealth

Safely and intuitively pivot within the network using our fully automated OPSEC early warning system

Lateral Movement

Infinite Pivoting and Chaining enabling access to systems otherwise inaccessible from the Internet

In Memory Only

Memory Only Scripting & Binaries Python, C#, Powershell, .NET PEs, DLLs, ELFs, SOs, Mach-Os, Bundles

Cross Platform

MacOS, Linux, Windows (x86), Andriod, iOS, IoT (ARM)

Collaboration

Multi-user interface enabling multi-threading and team operations

Armory

Curated "munitions" of easily upload-able proven exploitation modules

Enterprise Post Exploitation Platform

Voodoo had teamwork in mind when it came to designing the user interface. Multiple operators can interact with the same agents simultaneously.

IoT and OT support

Designed from the ground up to be stealthy, stable, and versatile. Chain agents together through a series of call-back (reverse) and call-in (connect) payloads providing access deep into target networks to information systems (e.g. SCADA networks, CDEs/Cardholder Data Environments, internal databases, etc.)

Train as you fight

Study the methods of the adversary and apply it to real-world scenarios via hands-on labs.

Let S2 show you what's possible

You deserve an expert security partner not just another service provider

  • Decades of experience securing Federal Enterprises and Fortune 50
  • Former NSA Operators skilled in the Adversary arts
  • Full scope Security-as-a-Service. Press the easy button.

Know your IMMINENT RISK

  • Please select a service offering in which you are interested in learning more.
  • This field is for validation purposes and should be left unchanged.