
Announcing the release of Tentacle C2
🐙 Tentacle is here
C2 without the overhead. Payloads without the pain.
After two years of development, countless nights buried in MS/Linux/Apple APIs, and more test rigs than we care to admit — Tentacle is now officially live. It’s clean, fast, portable, and ridiculously easy to deploy. Built for operators who want precision and power without bloated infrastructure or unnecessary complexity.
🔥 Why Tentacle?
Tentacle is a modern command-and-control platform that focuses on portability, usability, and power. It’s everything you need for red team ops, phishing engagements, and payload delivery — in a single executable. Whether you’re spinning it up locally or deploying it in the field, Tentacle adapts to your workflow instantly.
🧠 Key advantages
-
Interactive engagement map
Visualize and manage your operations in real time through a fully dynamic map of active targets, sessions and activities. -
Integrated payload SDKs
Build and deploy your own payloads with ease. Tentacle comes bundled with SDKs and examples to help you extend the built-in payload collection to fit your needs. -
Embedded phishing system
Host and deliver your payloads through a built-in phishing system — no separate infrastructure needed.
🚀 Built for real workflows
-
Cross-platform
Seamlessly supports Linux, Windows, and macOS (ARM-based). No fuss. No headaches. -
Portable by design
One file. No installation. No dependencies. No admin privileges required.
Drop it on a target box or spin it up locally — it just works. -
Self-contained docs & tutorials
You don’t need to RTFM some obscure markdowns. Tentacle ships with complete documentation and a step-by-step “Getting Started” guide embedded directly into the UI.
⚙️ How it works
Tentacle is distributed as a single executable file — no installers, no frameworks, no nonsense. Just run it and go.
By default, Tentacle spins up a local web interface on ports 8080
(HTTP) and 8443
(HTTPS). Everything from infrastructure setup to operation control happens through this embedded web UI. A local SQLite database is used to persist session and configuration data, so you can stop and restart without losing context, and even carry over engagement data with ease.
Need customization? Command-line arguments and the web-based configuration system allow full control over interface binding, SSL certs, and default behaviors — all documented, all configurable.
🛒 Available now
Tentacle is available as a yearly license for professionals who want more control and less friction. Get your license today!