This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python | |
| # Run this script on the agent.log file after you've run the situational_awareness/network/powerview/get_user module. | |
| # userdata.log file is pipe delimited. | |
| import sys | |
| import os | |
| class User: | |
| UserName = "" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| $Excel01 = New-Object -ComObject "Excel.Application" | |
| $ExcelVersion = $Excel01.Version | |
| $Excel01.DisplayAlerts = $false | |
| $Excel01.Visible = $false | |
| $wid=[System.Security.Principal.WindowsIdentity]::GetCurrent() | |
| $prp=new-object System.Security.Principal.WindowsPrincipal($wid) | |
| $adm=[System.Security.Principal.WindowsBuiltInRole]::Administrator | |
| $IsAdmin=$prp.IsInRole($adm) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| set PROMPT %red%L %yel%J %grn%S %blu%D | |
| load nessus | |
| load alias | |
| alias j "jobs -v" | |
| alias s "sessions -v" | |
| alias -f w "workspace" | |
| alias so "show options" | |
| alias sa "show advanced" | |
| alias -f e "exploit -j -z" | |
| alias um "use multi/handler" |
NewerOlder