PoshC2_Python/README.md

26 lines
1.0 KiB
Markdown
Raw Normal View History

2018-07-23 08:55:15 +00:00
# PoshC2
PoshC2 is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. The tools and modules were developed off the back of our successful PowerShell sessions and payload types for the Metasploit Framework. PowerShell was chosen as the base language as it provides all of the functionality and rich features required without needing to introduce multiple languages to the framework.
2018-07-23 10:03:33 +00:00
Windows Install (PoshC2):
2018-09-26 16:20:58 +00:00
```
2018-07-23 10:03:33 +00:00
powershell -exec bypass -c "IEX (New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/nettitude/PoshC2/master/C2-Installer.ps1')"
2018-09-26 16:20:58 +00:00
```
2018-07-23 10:03:33 +00:00
Linux Install (PoshC2_Python):
2018-09-26 16:20:58 +00:00
```
2018-07-23 10:04:48 +00:00
curl -sSL https://raw.githubusercontent.com/nettitude/PoshC2_Python/master/Install.sh | bash
2018-09-26 16:20:58 +00:00
```
2018-07-23 10:04:48 +00:00
2018-07-23 08:55:15 +00:00
# Documentation
We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/
Find us on #Slack - poshc2.slack.com
# Install
2018-09-26 16:20:58 +00:00
```
2018-07-23 08:55:15 +00:00
curl -sSL https://raw.githubusercontent.com/nettitude/PoshC2_Python/master/Install.sh | bash
2018-09-26 16:20:58 +00:00
```