Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      CommandoVM v2020.2 - Windows-based security distribution

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

      CommandoVM v2020.2 releases: Windows-based security distribution for penetration testing and red teaming

      Installed Tools
      Active Directory Tools

          Remote Server Administration Tools (RSAT)
          SQL Server Command Line Utilities
          Sysinternals

      Command & Control

          Covenant
          PoshC2
          WMImplant
          WMIOps

      Developer Tools

          Dep
          Git
          Go
          Java
          Python 2
          Python 3 (default)
          Ruby
          Ruby Devkit
          Visual Studio 2017 Build Tools (Windows 10)
          Visual Studio Code

      Evasion

          CheckPlease
          Demiguise
          DefenderCheck
          DotNetToJScript
          Invoke-CradleCrafter
          Invoke-DOSfuscation
          Invoke-Obfuscation
          Invoke-Phant0m
          Not PowerShell (nps)
          PS>Attack
          PSAmsi
          Pafishmacro
          PowerLessShell
          PowerShdll
          StarFighters

      Exploitation

          ADAPE-Script
          API Monitor
          CrackMapExec
          CrackMapExecWin
          DAMP
          EvilClippy
          Exchange-AD-Privesc
          FuzzySec’s PowerShell-Suite
          FuzzySec’s Sharp-Suite
          Generate-Macro
          GhostPack
              Rubeus
              SafetyKatz
              Seatbelt
              SharpDPAPI
              SharpDump
              SharpRoast
              SharpUp
              SharpWMI
          GoFetch
          Impacket
          Invoke-ACLPwn
          Invoke-DCOM
          Invoke-PSImage
          Invoke-PowerThIEf
          Kali Binaries for Windows
          LuckyStrike
          MetaTwin
          Metasploit
          Mr. Unikod3r’s RedTeamPowershellScripts
          NetshHelperBeacon
          Nishang
          Orca
          PSReflect
          PowerLurk
          PowerPriv
          PowerSploit
          PowerUpSQL
          PrivExchange
          Ruler
          SharpExchangePriv
          SharpExec
          SpoolSample
          UACME
          impacket-examples-windows
          vssown

      Information Gathering

          ADACLScanner
          ADExplorer
          ADOffline
          ADRecon
          BloodHound
          dnsrecon
          Get-ReconInfo
          GoWitness
          Nmap
          PowerView
              Dev branch included
          SharpHound
          SharpView
          SpoolerScanner

      Networking Tools

          Citrix Receiver
          OpenVPN
          Proxycap
          PuTTY
          Telnet
          VMWare Horizon Client
          VMWare vSphere Client
          VNC-Viewer
          WinSCP
          Windump
          Wireshark

      Password Attacks

          ASREPRoast
          CredNinja
          DSInternals
          Get-LAPSPasswords
          Hashcat
          Internal-Monologue
          Inveigh
          Invoke-TheHash
          KeeFarce
          KeeThief
          LAPSToolkit
          MailSniper
          Mimikatz
          Mimikittenz
          RiskySPN
          SessionGopher

      Reverse Engineering

          DNSpy
          Flare-Floss
          ILSpy
          PEview
          Windbg
          x64dbg

      Utilities

          7zip
          Adobe Reader
          AutoIT
          Cmder
          CyberChef
          Gimp
          Greenshot
          Hashcheck
          Hexchat
          HxD
          Keepass
          MobaXterm
          Mozilla Thunderbird
          Neo4j Community Edition
          Pidgin
          Process Hacker 2
          SQLite DB Browser
          Screentogif
          Shellcode Launcher
          Sublime Text 3
          TortoiseSVN
          VLC Media Player
          Winrar
          yEd Graph Tool

      Vulnerability Analysis

          AD Control Paths
          Egress-Assess
          Grouper2
          NtdsAudit
          zBang

      Web Applications

          Burp Suite
          Fiddler
          Firefox
          OWASP Zap
          Subdomain-Bruteforce

      Wordlists

          FuzzDB
          PayloadsAllTheThings
          SecLists

      Changelog

      v2020.2 – June 17, 2020

          Added support for Windows 10 2004
          Corrected syspin verb #124
          Removed WSL from default install #146, #120
          Removed Hyper V from default install #146, #120
          Removed Kali from default install #95, #120
          Removed Docker from default install #95, #120
          Created wsl.fireeye package #95, #120
          Created hyperv.fireeye package #95, #120
          Created multiple install profiles #95, #120
              Default, NestedV, Lite, Full, and Developer
          Removed some dependencies causing %PATH% variable to be truncated to 1024 characters #141
          Added logic to help speed up install
          Removed dependency on custom libraries file #131
          Added custom logging for installation of packages #70
          Fixed bug in autohotkey script for unhardening of UNC paths #68
          Updated Readme #140

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Perform 40+ security tests including brute-force attacks check your site for security vulnerabilities and holes checks for Timthumb vulnerability take preventive measures against attacks don’t let script kiddies hack your site
          Demo:

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          INE - OSCP Security Technology Course

          :m: This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


          Download:
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Detect This vulnerabilities
          Remote Code Execution
              Linux
          XSS Reflected
          Template Injection
              Jinja2
              ERB
              Java
              Twig
              Freemarker
          SQl Injection 
          OS Support:
          Linux
          Android
          Windows

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. You care about what you build.
          Protect your websites with the best WordPress security available.
          Wordfence includes an endpoint firewall and malware scanner that were built from the ground up to protect WordPress. Our Threat Defense Feed arms Wordfence with the newest firewall rules, malware signatures and malicious IP addresses it needs to keep your website safe. Rounded out by a suite of additional features, Wordfence is the most comprehensive security option available.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Cerber Security for WordPress - complete solution: firewall, anti-spam protection, and malware removal plugin
          Take your website security to the Next Level
          Cerber Security vigorously defends WordPress against hacker attacks, spam, and malware. Blazingly fast and reliable by design.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.