CIP Cyber

Babun – a Windows shell you will love!

Table of Contents

Would you like to use a linux-like console on a Windows host without a lot of fuzz? Try out babun!

Cygwin

The core of Babun consists of a pre-configured Cygwin. Cygwin is a
great tool, but there’s a lot of quirks and tricks that makes you lose a
lot of time to make it actually usable. Not only does babun
solve most of these problems, but also contains a lot of vital packages,
so that you can be productive from the very first minute.

Package manager

Babun provides a package manager called pact. It is similar to apt-get or yum. Pact enables installing/searching/upgrading and deinstalling cygwin packages with no hassle at all. Just invoke pact –help to check how to use it.

Shell

Babun’s shell is tweaked in order to provide the best possible
user-experience. There are two shell types that are pre-configured and
available right away – bash and zsh (zsh is the default one). Babun’s
shell features:
  • syntax highlighting

  • UNIX tools

  • software development tools

  • git-aware prompt

  • custom scripts and aliases

  • and much more!

Features

Babun features the following:
  • Pre-configured Cygwin with a lot of addons

  • Silent command-line installer, no admin rights required

  • pact – advanced package manager (like apt-get or yum)

  • xTerm-256 compatible console

  • HTTP(s) proxying support

  • Plugin-oriented architecture

  • Pre-configured git and shell

  • Integrated oh-my-zsh

  • Auto update feature

  • “Open Babun Here” context menu entry

    Download and read more

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings