Python Server for PoshC2
 
 
 
Go to file
benpturner 0b25e8d9f8 'Updated opsec command to add users compromised' 2018-10-31 15:43:02 +00:00
Files Added Standalone msbuild.exe - need to add to payloads.py 2018-10-16 18:08:41 +01:00
Images Initial Commit 2018-07-23 09:55:15 +01:00
Modules 'Updated Unhook-AMSI' 2018-10-30 12:21:30 +00:00
.gitignore Initial Commit 2018-07-23 09:55:15 +01:00
AutoLoads.py 'Updated print statements in preperation for Python3' 2018-10-27 19:50:47 +01:00
C2Server.py 'Updated print statements in preperation for Python3' 2018-10-27 19:50:47 +01:00
C2Viewer.py Initial Commit 2018-07-23 09:55:15 +01:00
Cert.py Initial Commit 2018-07-23 09:55:15 +01:00
Colours.py Initial Commit 2018-07-23 09:55:15 +01:00
Config.py 'Updated print statements in preperation for Python3' 2018-10-27 19:50:47 +01:00
Core.py 'Removed Print' 2018-09-02 20:09:58 +01:00
DB.py 'Added List-URLs Command to DB' 2018-10-10 08:16:32 +01:00
HTML.py 'Removed html and replaced with cgi' 2018-10-27 19:57:28 +01:00
Help.py 'Updated print statements in preperation for Python3' 2018-10-27 19:50:47 +01:00
INSTALL.txt Initial Commit 2018-07-23 09:55:15 +01:00
INSTALL_Socks.txt Initial Commit 2018-07-23 09:55:15 +01:00
INSTALL_Windows.txt Initial Commit 2018-07-23 09:55:15 +01:00
Implant.py 'Updated Implant Naming Convention v4.3' 2018-10-18 20:06:48 +01:00
ImplantHandler.py 'Updated opsec command to add users compromised' 2018-10-31 15:43:02 +00:00
Install.sh Initial Commit 2018-07-23 09:55:15 +01:00
LICENSE Initial Commit 2018-07-23 09:55:15 +01:00
Payloads.py 'Updated Implant Naming Convention v4.3' 2018-10-18 20:06:48 +01:00
README.md Minor changes to documentation 2018-09-26 19:15:32 +01:00
TabComplete.py Initial Commit 2018-07-23 09:55:15 +01:00
Tasks.py Updated InstallEXE-Persistence 2018-08-09 10:40:35 +01:00
Update.sh Update update.sh 2018-09-26 17:01:25 +01:00
changelog.txt 'Updated changelog' 2018-10-27 20:01:07 +01:00
poshc2.service Initial Commit 2018-07-23 09:55:15 +01:00
requirements.txt Initial Commit 2018-07-23 09:55:15 +01:00

README.md

PoshC2

PoshC2 is a proxy aware C2 framework written completely in PowerShell to aid penetration testers with red teaming, post-exploitation and lateral movement. The tools and modules were developed off the back of our successful PowerShell sessions and payload types for the Metasploit Framework. PowerShell was chosen as the base language as it provides all of the functionality and rich features required without needing to introduce multiple languages to the framework.

Windows Install (PoshC2):

powershell -exec bypass -c "IEX (New-Object System.Net.WebClient).DownloadString('https://raw.githubusercontent.com/nettitude/PoshC2/master/C2-Installer.ps1')"

Linux Install (PoshC2_Python):

curl -sSL https://raw.githubusercontent.com/nettitude/PoshC2_Python/master/Install.sh | bash

Documentation

We maintain PoshC2 documentation over at https://poshc2.readthedocs.io/en/latest/

Find us on #Slack - poshc2.slack.com

Install

curl -sSL https://raw.githubusercontent.com/nettitude/PoshC2_Python/master/Install.sh | bash