This document discusses how offensive security tools can provide value when used in a purple team exercise approach. It describes how a purple team consists of a cyber threat intelligence team, red team to emulate adversaries, and a blue team of defenders. The process involves the intelligence team providing adversary tactics, a tabletop discussion on security controls, the red team emulating tactics, the blue team detecting them, and documenting lessons learned to improve controls. The C2 Matrix tool is introduced for collaboratively evaluating command and control frameworks, and Slingshot C2 Matrix Edition is highlighted for easily testing C2 frameworks in purple team exercises. An example purple team exercise improved detection of threats from 0% to 64% without spending on new technology.