release/0.1.64 #39
grisuno
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Full Changelog: release/0.1.63...release/0.1.64
getadusers
Executes the GetADUsers.py script to retrieve Active Directory users.
The function retrieves the necessary parameters (domain controller IP and domain) from the
instance's parameter dictionary. If a credentials file exists in the 'sessions_dir',
it reads the file and uses the username/password combinations found there. If the file
does not exist, it prompts the user for a username and password.
The password is copied to the clipboard for convenience. A command is constructed using
the GetADUsers.py tool, and it is then executed to enumerate Active Directory users.
Args:
line (str): The password input from the command line or an empty string if not provided.
Returns:
None
crack_cisco_7_password
Crack a Cisco Type 7 password hash and display the plaintext.
This command takes an encrypted Cisco Type 7 password hash as input,
processes it to recover the original plaintext password, and prints the
result to the console.
Args:
line (str): The encrypted password hash in Cisco Type 7 format.
Returns:
None: The function prints the plaintext password directly to the console.
loxs
Command loxs: Installs and runs Loxs for multi-vulnerability web application scanning.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the input URL or file, custom payload, and additional options.
Returns:
None
Example:
loxs --url target.com
blazy
Command blazy: Installs and runs blazy for multi-vulnerability web application scanning.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the input URL.
Returns:
None
Example:
python3 main.py -i target.com
parth
Command parth: Installs and runs Parth for discovering vulnerable URLs and parameters.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target domain, import file, or additional Parth options.
Returns:
None
Example:
parth -t example.com
breacher
Command breacher: Installs and runs Breacher for finding admin login pages and EAR vulnerabilities.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target URL, file type, and additional Breacher options.
Returns:
None
Example:
breacher -u example.com --type php
xsstrike
Command xsstrike: Installs and runs XSStrike for finding XSS vulnerabilities.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying the target URL, crawling level, encoding, and other XSStrike options.
Returns:
None
Example:
xsstrike -u http://example.com/search.php?q=query --crawl -l 3
This discussion was created from the release release/0.1.64.
Beta Was this translation helpful? Give feedback.
All reactions