Retrieves all items (emails, contacts, calendar events, etc.) from a specified Outlook folder on the target system. This module enables operators to extract large volumes of mailbox data for analysis, exfiltration, or reconnaissance.
The module supports specifying the target folder (such as Inbox, Sent Items, or custom folders) and limits the number of items retrieved to avoid excessive data transfer or detection. It is useful for gathering sensitive communications, identifying sensitive information, or mapping user activity within an organization.
# | Option | Required | Type | Description |
---|---|---|---|---|
1 | Agent | Yes | STRING | Agent to run module on. |
2 | FolderName | Yes | STRING | Name of the Outlook folder to retrieve items from (e.g., Inbox, Sent Items). |
3 | MaxEmails | Yes | STRING | Maximum number of items to retrieve from the folder. |
4 | OutputFunction | No | STRING | PowerShell's output function to use ("Out-String", "ConvertTo-Json", "ConvertTo-Csv", "ConvertTo-Html", "ConvertTo-..."). |
IRIS C2 is engineered to operate seamlessly across all major operating systems, providing consistent functionality and performance regardless of your team's preferred environment.
Full support for Windows 10/11 with native syscall execution and EDR evasion
Complete support for Intel and Apple Silicon with TCC bypass capabilities
Extensive support for major distributions with kernel module evasion techniques
IRIS C2 provides consistent capabilities across all supported platforms, with specialized features optimized for each operating system.
Feature | Windows | macOS | Linux |
---|---|---|---|
Fileless Execution | |||
EDR/AV Evasion | |||
Dynamic Syscall Execution | |||
Process Injection | |||
Kernel Mode Operations | |||
TCC Bypass | |||
AMSI Bypass | |||
Credential Harvesting |
IRIS C2 consolidates the functionality of multiple specialized platforms into a single, comprehensive solution. Compare our capabilities against industry alternatives.
IRIS C2 is built with a modular architecture that allows for easy customization and extension. Developers can create custom modules and integrate with existing tools to build a tailored offensive security platform that meets specific operational requirements.
As well as open source or external models, IRIS C2 integrates with multiple deployment options including local models, cloud APIs, and hybrid configurations to provide AI-powered tactical guidance while maintaining operational security requirements.
Real-time tactical guidance based on current environment, target analysis, and operational objectives.
Advanced evasion strategies tailored to specific defensive technologies and environments.
Intelligent vulnerability assessment and exploitation recommendations based on comprehensive analysis.
Interact with the platform using natural language commands and receive contextual guidance.
Comprehensive penetration testing and security assessment capabilities for organizations seeking to validate their defensive posture through authorized testing.
Specialized capabilities designed for intelligence gathering operations with advanced attribution obfuscation and counter-intelligence features.
Mission-critical capabilities for military cyber operations with emphasis on operational security, mission assurance, and strategic objectives.
Full commercial license with complete access to all modules, AI co-pilot, and premium support. Includes regular updates and priority technical assistance.
IRIS C2 is available to qualified users in the following regions, subject to export control regulations and licensing requirements.
Availability in other regions may be subject to additional licensing requirements. Contact our sales team for specific regional availability and compliance requirements.