Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. [email protected]
_________ .___ \_ ___ \ ____ _____ _____ _____ ____ __| _/____ / \ \/ / _ \ / \ / \\__ \ / \ / __ |/ _ \ \ \___( <_> ) Y Y \ Y Y \/ __ \| | \/ /_/ ( <_> ) \______ /\____/|__|_| /__|_| (____ /___| /\____ |\____/ \/ \/ \/ \/ \/ \/ C O M P L E T E M A N D I A N T O F F E N S I V E V M Version 2020.2 [email protected] _____________________________________________________ Created by Jake Barteaux @day1player Mandiant Red Team Blaine Stancill @MalwareMechanic Nhan Huynh FireEye Labs Advanced Reverse Engineering
Welcome to CommandoVM - a fully customizable, Windows-based security distribution for penetration testing and red teaming.
For detailed install instructions or more information please see our blog
install.ps1on your newly configured machine.
Unblock-File .\install.ps1
Set-ExecutionPolicy Unrestricted -f
.\install.ps1
.\install.ps1 -password
The script will set up the Boxstarter environment and proceed to download and install the Commando VM environment. You will be prompted for the administrator password in order to automate host restarts during installation. If you do not have a password set, hitting enter when prompted will also work.
Please see our custom profiles for more custom install options or create your own following the instructions below. 1. Download the zip from https://github.com/fireeye/commando-vm into your Downloads folder. 2. Decompress the zip and edit the
${Env:UserProfile}\Downloads\commando-vm-master\commando-vm-master\profile.jsonfile by removing tools or adding tools in the “packages” section. You can add any package listed in our package list or any package from the chocolatey repository. 3. Open an administrative PowerShell window and enable script execution.Set-ExecutionPolicy Unrestricted -f4. Change to the unzipped project directory.cd ${Env:UserProfile}\Downloads\commando-vm-master\commando-vm-master\5. Unblock the install file by runningUnblock-File .\install.ps16. Take a snapshot of your machine! 7. Execute the install with the-profile_fileargument..\install.ps1 -profile_file .\profile.json
For more detailed instructions about custom installations, see our blog
Commando VM uses the Chocolatey Windows package manager. It is easy to install a new package. For example, enter the following command as Administrator to deploy Github Desktop on your system:
cinst github
You can find packages to install from our package list, which hosts more than just pentesting tools, or from the chocolatey repository.
Type the following command to update all of the packages to the most recent version:
cup all
This download configuration script is provided to assist penetration testers in creating handy and versatile toolboxes for offensive engagements. It provides a convenient interface for them to obtain a useful set of pentesting Tools directly from their original sources. Installation and use of this script is subject to the Apache 2.0 License. You as a user of this script must review, accept and comply with the license terms of each downloaded/installed package listed below. By proceeding with the installation, you are accepting the license terms of each package, and acknowledging that your use of each package will be subject to its respective license terms. Licenses for each package can be found in the packages.csv file for this repository.