Open thereisnotime opened 5 years ago
Thank you very much for the detailed notes! We will work to implement as much of this as we can.
My current observation is that Commando VM is missing a lot of tools that a penetration testing OS should come with. I have curated a list of improvements that include changes, new tools and configurations. I would like to request comments on this list and perhaps improve and implement it in Commando VM. Most penetration testing environments neglect clouds and containers, which is really unfortunate as they are the future. I have separated my suggestions in three categories - Add - software to be added in the installation script, Remove - remove software from the installation script and Configure - Windows or some other software configuration deployment.
Will not be adding
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
This is probably too much of a project for us. Happy to take suggestions or PRs :)
I believe the new hotness now is Obsidian or VS Code, which we have moved to for Commando 3.0
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Completed.
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Tracking at https://github.com/mandiant/VM-Packages/issues/635
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
Users can add this package manually with the new Add Package
feature in the install GUI
If possible could autospy be added also?
@fstelte https://github.com/sleuthkit/autopsy ?
@day1player yes that one
@fstelte tool requests are tracked in the mandiant/vm-packages repo. I have created the request for tracking here, please feel free to add more context :) https://github.com/mandiant/VM-Packages/issues/709
Proposal
My current observation is that Commando VM is missing a lot of tools that a penetration testing OS should come with. I have curated a list of improvements that include changes, new tools and configurations. I would like to request comments on this list and perhaps improve and implement it in Commando VM. Most penetration testing environments neglect clouds and containers, which is really unfortunate as they are the future. I have separated my suggestions in three categories - Add - software to be added in the installation script, Remove - remove software from the installation script and Configure - Windows or some other software configuration deployment.
1. Remove: WinRAR
Why:
2. Add: Crunch
Why:
URL:
3. Add: RBTray
Why
URL:
4. Config: Browser Bookmarks
Why:
URL:
5. Add: NirLauncher with NirSoft Tools
Why:
URL:
6. Add: Pupy
Why:
URL:
7. Add: Empire
Why:
URL:
8. Add: SDRSharp
Why:
URL:
9. Add: VirusTotal Uploader
Why:
URL:
10. Add: Social Engineer Toolkit
Why:
URL:
11. Add: SimpleDNSCrypt
Why:
URL:
12. Add: Browser Extensions
Why:
URL:
13. Add: TorBrowser
Why:
URL:
14. Add: I2PBrowser
Why:
URL:
15. Add: qBitTorrent
Why:
URL:
16. Add: NodeVersionManager
Why:
URL:
17. Configure: Random MAC
Why:
18. Add: Killswitch
Why:
URL:
19. Add: Notepad++ Plugins
Why:
URL:
20. Add: iPerf
Why:
URL:
21. Add: Session Manager
Why:
URL:
22. Add: Cloud CLI Tools
Why:
URL:
23. Add: Universal Database Client
Why:
URL:
24. Add: Filesystem Explorers
Why:
URL:
25. Add: SQLMap
Why:
URL:
26. Add: Scapy
Why:
URL:
27. Add: Docker
Why:
URL:
28. Add: Bettercap
Why:
URL:
29. Add: WPScan
Why:
URL:
30. Add: Arachni Scanner
Why:
URL:
31. Config: Disable input devices
Why:
32. Add: Cloud Nuke
Why:
URL:
33. Add: Clipboard Manager
Why:
URL:
34. Add: Snort
Why:
URL:
35. Add: THC-Hydra
Why:
URL:
36. Add: Freenet
Why:
URL:
37. Add: Lockhunter
Why:
URL:
38. Add: DBATools
Why:
URL:
39. Configure: Autoupdate Windows
Why:
URL: