ENNAENNA

Commando VM vs WinPwn

GitHub Stats

7.6k
Stars
3.7k
1.3k
Forks
542
8
Issues
2
6mo ago
Updated
8mo ago
Apache-2.0
License
BSD-3-Clause
PowerShell
Language
PowerShell

About Commando VM

Commando VM is a Windows-based penetration testing virtual machine distribution created by Mandiant (formerly FireEye). It uses Boxstarter, Chocolatey, and custom scripts to automatically install and configure over 140 offensive security tools on a Windows platform. This includes tools for Active Directory attacks, reverse engineering, exploitation, vulnerability analysis, and reconnaissance. Unlike Kali Linux, Commando VM provides a native Windows testing environment essential for testing Windows-specific exploits, running .NET offensive tools natively, and testing in environments where Linux tools are impractical.

About WinPwn

WinPwn is an automation framework for Windows internal penetration testing that combines dozens of offensive tools and techniques into a single PowerShell script. It performs automated reconnaissance (AD enumeration, network scanning, share hunting), privilege escalation checks, credential extraction (SAM, LSA, DPAPI, browser passwords), lateral movement, and persistence. WinPwn integrates with tools like Rubeus, SharpHound, Mimikatz, and Seatbelt, downloading and executing them in-memory. It is designed for situations where a tester has initial access to a Windows domain environment and needs rapid comprehensive assessment.

Platform Support

🪟windows
🪟windows

Tags

Shared

windows

Commando VM only

pentest-distrotoolsetmandiantvm-setup

WinPwn only

automationinternal-pentestprivilege-escalationactive-directory