• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Commando VM – Hack software suite on Windows to replace Kali Linux

AnonyViet by AnonyViet
January 29, 2023
in Security
0

For those who Pentest or Hacker they often use Kali Linux as a tool to attack. Kali Linux seems to dominate the user market for its rich and constantly updated tools. However, not everyone is familiar with Linux, with installation and use quite complicated. Commando VM will replace Kali Linux for that on Windows platform. This is a pre-built virtual machine operating system that runs on Windows 10. Commando VM is the first Windows penetration test release released by FireEye.

Join the channel Telegram of the AnonyViet 👉 Link 👈

What is Commando VM?

Commando VM is a set of commands on PowerShell to install vulnerability exploit tools. You can use Commando VM right on real Windows or virtual machine VMWare, Virtual Box and turn your computer into a powerful hacking tool. The Commando VM uses the Boxstarter , Chocolatey , and MyGet packages to install all the software and tools to support penetration testing. You need at least 60GB of free hard drive space and 2GB of RAM to use it. Supports 140 tools for Hackers such as:

Hackers who want to collect Hack tools must manually install each software. Not to mention being blocked by Windows due to software that deeply interferes with the operating system. This is a difficult problem when using Windows as an attack platform.

With Commando VM allows download of Red Team tools and will remove the “malicious” features on Windows. This installer will disable many security features of Windows, implementing it will expose Windows to many vulnerabilities for this reason AnonyViet recommends you to install it on a virtual machine.

In other words: Commando VM is a code that helps to quickly install Hack tools for Hackers on Windows

What is Commando VM?

Features of Commando VM

Born to be a system security testing tool. FireEye recommends that people use Commando VM for the purpose of checking the system’s safety, not using it to attack or gain unauthorized access to other systems.

“We’re looking forward to addressing user feedback, adding more tools and features, and making more improvements,” FireEye said. “We believe this distribution will become the standard tool for penetration testers and look forward to continuing to improve and develop the attack platform on Windows.”

Commando VM can be installed on Windows 7 Service Pack 1 or Windows 10. Later versions will add more features. The three outstanding features supported are:

  • Native Windows protocol support (SMB, PowerShell, RSAT, Sysinternals, etc.)
  • Attack Kit (Tools for Crawling, Exploiting, Password Attacks, etc.)
  • Windows-based C2 frameworks like Covenant (dotnet) and PoshC2 (PowerShell)

How to install Commando VM to become an attack tool on Windows

Installing the Commando VM is pretty easy. Just Download Commando VMextract it and then execute the PowerShell script available in the package on Windows on the virtual machine to install.

Note: choose the correct version of Windows 7 or Windows 10

The rest of the installation will be done automatically, it may take 2 to 3 hours to complete depending on your Internet speed.

“VM will restart many times due to many software installation requests”. “When the installation is complete, press any key to exit PowerShell”

After the installation is complete, all you need to do is reboot the machine to make sure the final configuration changes take effect.

Prepare the virtual machine

As mentioned above, to avoid affecting the operation of Windows, you should use a virtual machine to install Commando VM. The most common are VMWare, Virtual Box, or Hyper-V…. Perform steps to create virtual machine on VMWare. Make sure your virtual machine is updated Windows to the latest version.

Start installing Commando VM and required packages

Now you have a Windows virtual machine on a real Windows.

Step 1: Download Commando VM correct version of Windows on the computer. Extract the folder to the Desktop, there will be a folder “commando-vm-master”

Step 2: Let’s open the tool PowerShell available on Windows up. Should open with permission Administrator

how to open PowerShell

Enter the command line Set-ExecutionPolicy Unrestricted to grant execution permission.

When prompted to confirm, press A and Enter to agree to grant permission.

Enter the command line Set-ExecutionPolicy Unrestricted

Use command cd to move back to the “commando-vm-master” folder just unzipped above. Make sure there is a file in the folder install.ps1

Type command .\install.ps1 to start the installation.

install commando vm

The installation process will set up the Boxstarter environment and proceed to download and install the Commando VM environment. You will be prompted to enter a Password to automatically reboot the machine during installation. If you do not set a Password, just press Enter to skip this step.

Manually install other tool packages:

Commando VM uses Chocolatey Windows manager. You can easily to install a new package. For example, enter the following command as Administrator to install Github Desktop on your system: cinst github

Update new versions for installed packages

Enter the following command to update all packages to the latest version: cup all

All tools installed:

Tools for Active Directory

  • Remote Server Administration Tools (RSAT)
  • SQL Server Command Line Utilities
  • Sysinternals

Command & Control

  • Covenant
  • PoshC2
  • WMIplant
  • WMIOps

Programming tools

  • Dep
  • Git
  • Go
  • Java
  • Python 2
  • Python 3 (default)
  • Visual Studio 2017 Build Tools (Windows 10)
  • Visual Studio Code

Evasion

  • CheckPlease
  • Demiguise
  • DotNetToJScript
  • Invoke-CradleCrafter
  • Invoke-DOSfuscation
  • Invoke-Obfuscation
  • Invoke-Phant0m
  • Not PowerShell (nps)
  • PS>Attack
  • PSAmsi
  • Pafishmacro
  • PowerLessShell
  • PowerShdll
  • StarFighters

Vulnerability Exploitation

  • ADAPE-Script
  • API Monitor
  • CrackMapExec
  • CrackMapExecWin
  • DAMP
  • Exchange-AD-Privesc
  • FuzzySec’s PowerShell-Suite
  • FuzzySec’s Sharp-Suite
  • Generate-Macro
  • GhostPack
    • Rubeus
    • SafetyKatz
    • Seatbelt
    • SharpDPAPI
    • SharpDump
    • SharpRoast
    • SharpUp
    • SharpWMI
  • GoFetch
  • Impacket
  • Invoke-ACLPwn
  • Invoke-DCOM
  • Invoke-PSImage
  • Invoke-PowerThIEf
  • Kali Binaries for Windows
  • LuckyStrike
  • MetaTwin
  • Metasploit
  • Mr. Unikod3r’s RedTeamPowershellScripts
  • NetshHelperBeacon
  • Nishang
  • Orca
  • PSReflect
  • PowerLurk
  • PowerPriv
  • PowerSploit
  • PowerUpSQL
  • PrivateExchange
  • ruler
  • SharpExchangePriv
  • SpoolSample
  • UACME
  • impacket-examples-windows
  • vsdown

Collect information

  • ADACLScanner
  • ADExplorer
  • ADOffline
  • ADRecon
  • BloodHound
  • Get-ReconInfo
  • GoWitness
  • Nmap
  • PowerView
  • SharpHound
  • SharpView
  • SpoolerScanner

Network Miner Kit

  • Citrix Receiver
  • OpenVPN
  • Proxycap
  • PuTTY
  • Telnet
  • VMWare Horizon Client
  • VMWare vSphere Client
  • VNC-Viewer
  • WinSCP
  • Windump
  • Wireshark

Password attack

  • ASRERoast
  • CredNinja
  • DSInternals
  • Get-LAPSPasswords
  • Hashcat
  • Internal-Monologue
  • Inveigh
  • Invoke-TheHash
  • KeeFarce
  • KeeThief
  • LAPSToolkit
  • MailSniper
  • Mimikatz
  • Mimikittenz
  • RiskySPN
  • SessionGopher

Reverse translation technique

  • DNSpy
  • Flare-Floss
  • ILSpy
  • PEview
  • Windbg
  • x64dbg

Applications

  • 7zip
  • Adobe Reader
  • AutoIT
  • Cmder
  • CyberChef
  • Gimp
  • Greenshot
  • Hashcheck
  • Hexchat
  • HxD
  • Keepass
  • MobaXterm
  • Mozilla Thunderbird
  • Neo4j Community Edition
  • Pidgin
  • Process Hacker 2
  • SQLite DB Browser
  • Screentogif
  • Shellcode Launcher
  • Sublime Text 3
  • TortoiseSVN
  • VLC Media Player
  • Winrar
  • yEd Graph Tool

Vulnerability analysis

  • Egress-Assess
  • Grouper2
  • zBang

Web Apps

  • Burp Suite
  • Fiddler
  • Firefox
  • OWASP Zap

Wordlists used to BruteFroce

  • FuzzDB
  • PayloadsAllTheThings
  • SecLists

The article achieved: 5/5 – (100 votes)

Tags: CommandoHackKaliLinuxreplacesoftwareSuiteWindows
Previous Post

Instructions for using iTopVPN – The best VPN software today

Next Post

How to create a website to introduce yourself with Bio Link for free

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
How to create a website to introduce yourself with Bio Link for free

How to create a website to introduce yourself with Bio Link for free

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
7 ways to release RAM to accelerate your Windows computer

7 ways to release RAM to accelerate your Windows computer

May 21, 2025
Discover Supermix – Smart playlist on YouTube Music

Discover Supermix – Smart playlist on YouTube Music

May 20, 2025
Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
7 ways to release RAM to accelerate your Windows computer

7 ways to release RAM to accelerate your Windows computer

May 21, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Guide to comment on the constitution amendment on VNEID

Guide to comment on the constitution amendment on VNEID

May 21, 2025
Tips to fix the file is open in another program

Tips to fix the file is open in another program

May 21, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET bongdaso