Voodoo is a platform for covert interactive cyber operations creating a force multiplier in your team's offensive operations
Safely and intuitively pivot within the network using our fully automated OPSEC early warning system
Infinite Pivoting and Chaining enabling access to systems otherwise inaccessible from the Internet
In Memory Only
Memory Only Scripting & Binaries Python, C#, Powershell, .NET PEs, DLLs, ELFs, SOs, Mach-Os, Bundles
MacOS, Linux, Windows (x86), Andriod, iOS, IoT (ARM)
Multi-user interface enabling multi-threading and team operations
Curated "munitions" of easily upload-able proven exploitation modules
Enterprise Post Exploitation Platform
Voodoo had teamwork in mind when it came to designing the user interface. Multiple operators can interact with the same agents simultaneously.
IoT and OT support
Designed from the ground up to be stealthy, stable, and versatile. Chain agents together through a series of call-back (reverse) and call-in (connect) payloads providing access deep into target networks to information systems (e.g. SCADA networks, CDEs/Cardholder Data Environments, internal databases, etc.)
Train as you fight
Study the methods of the adversary and apply it to real-world scenarios via hands-on labs.
Let S2 show you what's possible
You deserve an expert security partner not just another service provider
- Decades of experience securing Federal Enterprises and Fortune 50
- Former NSA Operators skilled in the Adversary arts
- Full scope Security-as-a-Service. Press the easy button.