Commando VM
Apache-2.0๐ฅ Offensive Ops ยท PowerShell
Commando VM is a Windows-based penetration testing virtual machine distribution created by Mandiant (formerly FireEye). It uses Boxstarter, Chocolatey, and custom scripts to automatically install and configure over 140 offensive security tools on a Windows platform. This includes tools for Active Directory attacks, reverse engineering, exploitation, vulnerability analysis, and reconnaissance. Unlike Kali Linux, Commando VM provides a native Windows testing environment essential for testing Windows-specific exploits, running .NET offensive tools natively, and testing in environments where Linux tools are impractical.
Installation
$ git clone https://github.com/mandiant/commando-vm.git && cd commando-vm && .\install.ps1Use Cases
- Setting up a Windows-based penetration testing environment
- Running Windows-native offensive tools without Linux
- Active Directory attack testing from a domain-joined machine
- Training and lab environments for Windows exploitation
Tags
Details
- Category
- ๐ฅ Offensive Ops
- Language
- PowerShell
- Repository
- mandiant/commando-vm
- License
- Apache-2.0
- Platforms
- ๐ชwindows
Links
Community Reviews
Alternatives & Comparisons
More in Offensive Ops
Mythic
GoCollaborative, multi-platform C2 framework. Docker-based with web UI, multiple agent types, and plugin architecture.
Havoc
C/C++Modern C2 framework. Qt-based GUI, BOF support, custom agents, and a Cobalt Strike-inspired workflow.
Rubeus
C#C# toolset for raw Kerberos interaction and abuse. AS-REP roasting, Kerberoasting, ticket manipulation, delegation attacks.
Certipy
PythonActive Directory Certificate Services (AD CS) abuse tool. Find and exploit certificate template misconfigurations.
Coercer
PythonAutomatically find and exploit Windows authentication coercion vulnerabilities. PetitPotam, PrinterBug, and more.
SharpHound
C#Official BloodHound data collector. Enumerates Active Directory objects, sessions, ACLs, and trusts for graph analysis.