How to Install and Uninstall poshc2 Package on Kali Linux

Last updated: May 17,2024

1. Install "poshc2" package

Please follow the guidelines below to install poshc2 on Kali Linux

$ sudo apt update $ sudo apt install poshc2

2. Uninstall "poshc2" package

Please follow the guidelines below to uninstall poshc2 on Kali Linux:

$ sudo apt remove poshc2 $ sudo apt autoclean && sudo apt autoremove

3. Information about the poshc2 package on Kali Linux

Package: poshc2
Version: 7.4.0-0kali1
Architecture: all
Maintainer: Kali Developers
Installed-Size: 37577
Depends: graphviz, mingw-w64, mingw-w64-common, mingw-w64-tools, mingw-w64-x86-64-dev, mingw-w64-i686-dev, espeak, mono-devel, postgresql, python3-donut, python3-openssl, python3-pandas, python3-prompt-toolkit, python3-psycopg2, python3-pycryptodome, python3-yaml, sqlite3, vim | editor, python3:any
Recommends: powershell
Homepage: https://github.com/nettitude/PoshC2
Priority: optional
Section: non-free/misc
Filename: pool/non-free/p/poshc2/poshc2_7.4.0-0kali1_all.deb
Size: 10092408
SHA256: eaedbbea2f83ea42c2216281fdf90083745bc3985a41a108d928ea93d37ae565
SHA1: e4a12ea2b2cd1454eb23bde71c89acf9d7055989
MD5sum: edce2f5df50857fbc729d665b781e19b
Description: proxy aware C2 framework
This package contains a proxy aware C2 framework used to aid penetration
testers with red teaming, post-exploitation and lateral movement.
.
PoshC2 is primarily written in Python3 and follows a modular format to enable
users to add their own modules and tools, allowing an extendible and flexible
C2 framework. Out-of-the-box PoshC2 comes PowerShell/C# and Python3 implants
with payloads written in PowerShell v2 and v4, C++ and C# source code, a
variety of executables, DLLs and raw shellcode in addition to a Python3
payload. These enable C2 functionality on a wide range of devices and
operating systems, including Windows, *nix and OSX.
.
Other notable features of PoshC2 include:
- Consistent and Cross-Platform support using Docker.
- Highly configurable payloads, including default beacon times, jitter,
kill dates, user agents and more.
- A large number of payloads generated out-of-the-box which are frequently
updated and maintained to bypass common Anti-Virus products.
- Auto-generated Apache Rewrite rules for use in a C2 proxy, protecting
your C2 infrastructure and maintaining good operational security.
- A modular format allowing users to create or edit C#, PowerShell or
Python3 modules which can be run in-memory by the Implants.
- Notifications on receiving a successful Implant, such as via text message
or Pushover.
- A comprehensive and maintained contextual help and an intelligent prompt
with contextual auto-completion, history and suggestions.
- Fully encrypted communications, protecting the confidentiality and
integrity of the C2 traffic even when communicating over HTTP.
- Client/Server format allowing multiple team members to utilise a single
C2 server.
- Extensive logging. Every action and response is timestamped and stored in
a database with all relevant information such as user, host, implant
number etc. In addition to this the C2 server output is directly logged
to a separate file.
- PowerShell-less implants that do not use System.Management.Automation.dll
using C# or Python.
- A free and open-source SOCKS Proxy by integrating with SharpSocks
Description-md5: