With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| $max_depth = 6 | |
| $rp_exe_path = "C:\tools\rp-win-x86.exe" | |
| $out_dir = Join-Path (Get-Location) "rp_output" | |
| $all_prefix = "all_" | |
| $target_files = $args | |
| # Ensure the output directory exists | |
| New-Item -ItemType Directory -Path $out_dir -Force -ErrorAction SilentlyContinue | Out-Null |
| # Ensure System.Security assembly is loaded. | |
| Add-Type -AssemblyName System.Security | |
| function ConvertTo-CIPolicy { | |
| <# | |
| .SYNOPSIS | |
| Converts a binary file that contains a Code Integrity policy into XML format. | |
| Author: Matthew Graeber (@mattifestation) |
| import requests | |
| import sys | |
| import re | |
| import semver | |
| import json | |
| import signal | |
| import warnings | |
| warnings.filterwarnings("ignore") | |
| HEADERS = {"User-Agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:67.0) Gecko/20100101 Firefox/67.0"} |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| /*************** | |
| * Simple Process Hollowing in C# | |
| * | |
| * #Build Your Binaries | |
| * c:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe Hollowing.cs /unsafe | |
| * | |
| * @author: Michael Gorelik <smgorelik@gmail.com> | |
| * gist.github.com/smgorelik/9a80565d44178771abf1e4da4e2a0e75 | |
| * #Most of the code taken from here: @github: github.com/ambray |
| #!/usr/bin/env python | |
| import sys | |
| import os.path | |
| if __name__ == "__main__": | |
| if len(sys.argv) != 2: | |
| print("usage: {} names.txt".format((sys.argv[0]))) | |
| sys.exit(0) | |
| if not os.path.exists(sys.argv[1]): |
| eCPPT NETWORK SECURITY | |
| *DNS Enumeration | |
| nslookup example.com | |
| nslookup -query=mx domain | |
| nslookup -query=ns domain | |
| nslookup -query=any domain | |
| interactime mode { |
Penetrating Testing/Assessment Workflow & other fun infosec stuff
https://github.com/jivoi/pentest
My feeble attempt to organize (in a somewhat logical fashion) the vast amount of information, tools, resources, tip and tricks surrounding penetration testing, vulnerability assessment, and information security as a whole*