https://github.com/cyb3rward0g/docker-poshc2
PoshC2 Framework
https://github.com/cyb3rward0g/docker-poshc2
Last synced: 3 months ago
JSON representation
PoshC2 Framework
- Host: GitHub
- URL: https://github.com/cyb3rward0g/docker-poshc2
- Owner: Cyb3rWard0g
- License: gpl-3.0
- Created: 2020-04-16T21:20:39.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2021-03-17T03:15:35.000Z (over 4 years ago)
- Last Synced: 2025-03-21T01:34:25.653Z (7 months ago)
- Language: Shell
- Size: 25.4 KB
- Stars: 11
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Docker PoshC2
PoshC2 is a proxy aware C2 framework used to aid penetration testers with red teaming, post-exploitation and lateral movement. This is a dockerized version of it on the top of an Ubuntu box with an entrypoint script to pass environment variables and update the main server config when running the docker image.
## Getting Started
### Pull remote image
```
docker image pull cyb3rward0g/docker-poshc2:20210315
```### tag docker image
```
docker tag cyb3rward0g/docker-poshc2:20210315 poshc2
```### Run the Posh server
```
sudo docker run -ti -d -p 443:443 -e PAYLOAD_COMMS_HOST=https://192.168.2.7 --name poshc2 poshc2
sudo docker exec -ti poshc2 bash
posh-project -n rce
posh-server
```### Download Poshc2 Payload of Interest
```
sudo docker cp psh:/var/poshc2/rce/payloads/dropper_cs_ps_v4.exe .
```### Host Payoad
```
python3 -m http.server
```### Run the Posh client
```
sudo docker exec -ti poshc2 bash
posh -u wardog
```