defcon27_csharp_workshop
PoshC2
defcon27_csharp_workshop | PoshC2 | |
---|---|---|
1 | 1 | |
952 | 1,698 | |
- | 0.8% | |
10.0 | 0.0 | |
about 2 years ago | 30 days ago | |
C# | PowerShell | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
defcon27_csharp_workshop
PoshC2
-
Sketchy stuff lately?
PowerShell has never been used for nefarious purposes. ;-)
What are some alternatives?
PipeViewer - A tool that shows detailed information about named pipes in Windows
Empire - Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.
frostbyte - FrostByte is a POC project that combines different defense evasion techniques to build better redteam payloads
Empire - Empire is a PowerShell and Python post-exploitation agent.
LocalAdminSharp - .NET executable to use when dealing with privilege escalation on Windows to gain local administrator access
Invoke-MetasploitPayload - Powershell script to download and kick off Metasploit payloads. Relies on the exploit/multi/scripts/web_delivery metasploit module.
Sandman - Sandman is a NTP based backdoor for red team engagements in hardened networks.
empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
CIMplant - C# port of WMImplant which uses either CIM or WMI to query remote systems
ConPtyShell - ConPtyShell - Fully Interactive Reverse Shell for Windows
PowerShell-Botnet - A POC powershell botnet
nishang - Nishang - Offensive PowerShell for red team, penetration testing and offensive security.