PoshC2
empire
Our great sponsors
PoshC2 | empire | |
---|---|---|
1 | 3 | |
1,692 | 2,685 | |
1.7% | 0.0% | |
0.0 | 0.0 | |
14 days ago | 5 months ago | |
PowerShell | Go | |
BSD 3-clause "New" or "Revised" License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PoshC2
-
Sketchy stuff lately?
PowerShell has never been used for nefarious purposes. ;-)
empire
- Empire: A PaaS Built on Top of Amazon EC2 Container Service
-
Idiomatic Go project strucutre
A really good example of a large app in Go with good packaging is empire.
- Tools / software / resources library
What are some alternatives?
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
Covenant - Covenant is a collaborative .NET C2 framework for red teamers.
Empire - Empire is a PowerShell and Python post-exploitation agent.
sliver - Adversary Emulation Framework
Invoke-MetasploitPayload - Powershell script to download and kick off Metasploit payloads. Relies on the exploit/multi/scripts/web_delivery metasploit module.
Starkiller - Starkiller is a Frontend for PowerShell Empire.
ConPtyShell - ConPtyShell - Fully Interactive Reverse Shell for Windows
workflow - Hephy Workflow - An open source fork of Deis Workflow - The open source PaaS for Kubernetes.
PowerShell-Botnet - A POC powershell botnet
gasper - Your Cloud in a Binary
nishang - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
CapRover - Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids