With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| <# Answers the original question located on the ShareFile-PowerShell Repository Issues list (#66). | |
| https://github.com/citrix/ShareFile-PowerShell/issues/66#issue-1001263931 | |
| #> | |
| Add-PSSnapin ShareFile | |
| $sfClient = New-SfClient -Name "$env:Temp\sfclient.sfps" | |
| $sfEmployee = New-Object ShareFile.Api.Models.User | |
| $sfEmployee.FirstName = 'First Name' |
| let bookmarkList = Array.from(document.querySelectorAll('.widget>.vbox')) | |
| .map(e => e.shadowRoot) | |
| .map(e => e && e.querySelector('.device-page-list')) | |
| .find(e => e); | |
| let bookmarks = Array.from(bookmarkList.querySelectorAll('.vbox')) | |
| .map(e => `<a href="${e.querySelector('x-link').innerHTML}">${e.querySelector('.device-page-title').innerHTML}</a>`); | |
| copy('<html><body>' + bookmarks.join('\n') + '</body></html>'); |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| Set-ExecutionPolicy Bypass -Scope Process -Force; iex ((New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1')) | |
| choco install chocolatey -y | |
| choco install sql-server-management-studio -y | |
| choco install azure-data-studio -y | |
| choco install azuredatastudio-powershell -y | |
| choco install git.install -y | |
| choco install vscode -y | |
| choco install vscode-powershell -y | |
| choco install powerbi -y |
| Hi All! | |
| I've recently launched a tool that wraps many of the commands here with a user interface. This desktop application is currently available for macOS. There's a roadmap outlining planned features for the near future. | |
| Feel free to request any features you'd like to see, and I'll prioritize them accordingly. | |
| One of the most important aspects of this application is that every command executed behind the scenes is displayed in a special log section. This allows you to see exactly what’s happening and learn from it. | |
| Here's the link to the repository: https://github.com/Pulimet/ADBugger | |
| App Description: | |
| ADBugger is a desktop tool designed for debugging and QA of Android devices and emulators. It simplifies testing, debugging, and performance analysis by offering device management, automated testing, log analysis, and remote control capabilities. This ensures smooth app performance across various setups. |
| (StringInput)=> | |
| let | |
| /*function for reversing the bits in a 8-bit number*/ | |
| reverse = (x) => | |
| Number.Mod(Number.BitwiseAnd((x* 0x0202020202),0x010884422010),1023), | |
| /*function for reversing the bits in a 32-bit number*/ | |
| reverse32 = (x) => | |
| let | |
| b0 = Number.BitwiseAnd(x,0xff), |
| ' | |
| Public Sub SaveWorksheetsAsCsv() | |
| Dim WS As Excel.Worksheet | |
| Dim SaveToDirectory As String | |
| Dim CurrentWorkbook As String | |
| Dim CurrentFormat As Long | |
| CurrentWorkbook = ThisWorkbook.FullName |
| '''get list of outlook emails into python list, if not already | |
| use address_list = email_list.split(';')''' | |
| sec_list = [] | |
| for item in address_list: | |
| m1 = re.search("([a-z]>)",item) | |
| m2= re.search("<",item) | |
| new_item = item[m2.start()+1:m1.end()-1] | |
| sec_list.append(new_item) | |
| new_address_string = (',').join(sec_list) |
| function Import-Excel { | |
| <# | |
| .SYNOPSIS | |
| Creates table-like custom objects from the items in a Excel file. | |
| Requires Excel be installed! | |
| .DESCRIPTION | |
| The Import-Excel cmdlet creates table-like custom objects from the items in Excel | |
| Worksheets. | |
| Each column in the Excel Worksheet becomes a property of the custom object and the items in | |
| rows become the property values. Import-Excel works on any file supported by Excel. |