SkillAgentSearch skills...

NEBULA

Interactive PowerShell framework for testing WMI, COM, LOLBAS, and persistence techniques

Install / Use

/learn @MHaggis/NEBULA
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

NEBULA 🌌

<div align="center"> <img src="assets/NEBULA_logo.png" alt="NEBULA Logo" width="400"> </div>

Nefarious Execution & Behavioral Unit for LOLBAS Attacks

An interactive PowerShell TUI for testing and exploring Windows execution techniques, COM objects, WMI methods, and LOLBAS (Living Off The Land Binaries and Scripts) techniques.

<div align="center"> <img src="assets/NEBULA_menu.png" alt="NEBULA Menu" width="400"> </div>

Overview

NEBULA is an atomic testing framework designed for security researchers, red teamers, and blue teamers to understand and test various Windows execution and persistence techniques in a controlled environment.

Features

🎯 WMI Execution Techniques 💻 COM Object Techniques 🔒 Persistence Techniques 🛠️ LOLBAS Execution Methods 🔍 Advanced WMI Exploration

<div align="center"> <img src="assets/NEBULA_com.png" alt="NEBULA COM Menu" width="400"> <p>NEBULA COM Menu</p> </div>

Usage

# Run NEBULA
.\Launch-Nebula.bat

# Or from PowerShell
powershell.exe -ExecutionPolicy Bypass -File .\Nebula.ps1

Navigation

NEBULA uses a clean, menu-driven interface:

  • Number keys (1-7): Select menu options
  • B: Back to previous menu
  • Q: Quit application

Test Results Tracking

All executed tests are logged with:

  • Timestamp
  • Test name
  • Technique used
  • Status (SUCCESS/FAILED/ERROR/DRY-RUN)
  • Details and output

View results anytime via the "View Test Results" menu option.

Requirements

  • Windows 10/11 or Windows Server 2016+
  • PowerShell 5.1 or later
  • Administrator privileges (for some techniques)

Example Payloads

NEBULA includes example payloads in the examples/ folder for testing LOLBAS techniques. These payloads are sourced from Atomic Red Team.

Available Test Payloads

  • regsvr32_squiblydoo.sct - RegSvr32 Squiblydoo technique (T1218.010)
  • mshta_calc.hta - MSHTA remote HTA execution (T1218.005)
  • rundll32_calc.sct - Rundll32 JavaScript protocol (T1218.011)
  • rundll32_javascript.txt - Command reference for Rundll32 techniques
  • msbuild_inline_task.csproj - MSBuild inline task execution (T1127.001)
  • certutil_download.txt - CertUtil download technique reference (T1105)
  • bitsadmin_transfer.txt - BITSAdmin background transfer reference (T1197)
  • installutil_bypass.txt - InstallUtil AppLocker bypass reference (T1218.004)

All example payloads execute benign actions (e.g., launching calc.exe) for safe testing.

Attribution: Test payloads sourced from Atomic Red Team © Red Canary

Author

@MHaggis

Acknowledgments

NEBULA utilizes test payloads from Atomic Red Team by Red Canary.

Atomic Red Team is a library of tests mapped to the MITRE ATT&CK® framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.

  • Atomic Red Team: https://github.com/redcanaryco/atomic-red-team
  • Copyright: © Red Canary

The example payloads in the examples/ folder are derived from Atomic Red Team and modified for use with NEBULA's testing framework.


"In the nebula of Windows internals, every technique leaves a trace."

Related Skills

View on GitHub
GitHub Stars112
CategoryDevelopment
Updated6d ago
Forks19

Languages

PowerShell

Security Score

100/100

Audited on Mar 24, 2026

No findings