PoshC2
ConPtyShell
Our great sponsors
PoshC2 | ConPtyShell | |
---|---|---|
1 | 3 | |
1,692 | 913 | |
1.7% | - | |
0.0 | 0.0 | |
14 days ago | over 1 year ago | |
PowerShell | PowerShell | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PoshC2
-
Sketchy stuff lately?
PowerShell has never been used for nefarious purposes. ;-)
ConPtyShell
-
Powershell doesn't work in my netcat reverse shell
The console/tty support in Windows is not....great. This has only been changing in recent Windows 10 versions. You can run into issues a lot if whatever app you are running does more than basic i/o. One thing you may want to try out is ConPtyShell. It will let you create a much nicer reverse shell experience on newer Windows 10 targets.
- ConPtyShell - Fully Interactive Reverse Shell for Windows :
-
Tips for Windows fully interactive shell
For the longest time, the Windows console just...wasn't very good. It didn't have the kind of PTY support that Linux, etc. had. This has changed in more recent versions of Windows 10, as part of WSL improvements. There is at least one package, ConPtyShell, that takes advantage of this for bind/reverse shell use. Other than that, there is not a whole lot else.
What are some alternatives?
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
terminalizer - 🦄 Record your terminal and generate animated gif images or share a web player
Empire - Empire is a PowerShell and Python post-exploitation agent.
Chimera - Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Invoke-MetasploitPayload - Powershell script to download and kick off Metasploit payloads. Relies on the exploit/multi/scripts/web_delivery metasploit module.
nishang - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
Terminal-Icons - A PowerShell module to show file and folder icons in the terminal
PowerShell-Botnet - A POC powershell botnet
DotFetch - An alternative to NeoFetch on Windows
vulnerable-AD - Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab