release/0.2.13 #56
grisuno
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Full Changelog: release/0.2.12...release/0.2.13
pykerbrute
Command pykerbrute: Automates the installation and execution of PyKerbrute for bruteforcing Active Directory accounts using Kerberos pre-authentication.
This function performs the following tasks:
Args:
line (str): Optional argument for specifying additional parameters for execution, such as domain controller, domain, and attack mode.
Returns:
None
reg_py
Run reg.py with specified parameters to query the registry.
:param line: Line input for any additional parameters.
:returns: None
Manual execution:
To manually run
reg.py
, use the following command:This function prompts the user for the hash, domain, username, and registry key if they are not already provided.
name_the_hash
Identify hash type using nth after retrieving it with get_hash().
:param line: Line input for any additional parameters.
:returns: None
Manual execution:
To manually identify the hash, use the following command:
This function fetches the hash using get_hash() and identifies its type. If nth is not installed, it is automatically installed.
refill_password
Generate a list of possible passwords by filling each asterisk in the input with user-specified characters.
:param line: A string containing asterisks (e.g., WebAO***7) for generating variations.
:returns: None
Process:
Prompts the user to enter characters to replace each asterisk, creates all possible combinations,
and saves them to 'sessions/passwords_refilled.txt'. If this file exists, the previous version is
renamed with a timestamp suffix.
sudo
Checks if the script is running with superuser (sudo) privileges, and if not,
restarts the script with sudo privileges.
This function verifies if the script is being executed with root privileges
by checking the effective user ID. If the script is not running as root,
it prints a warning message and restarts the script using sudo.
:return: None
netview
Executes the Impacket netview tool to list network shares on a specified target.
This function performs the following actions:
credentials*.txt
and allows the user to select which file to use for executing the command.
and executes the command with the hash.
Parameters:
line (str): A command argument to determine the authentication mode.
If "pass", the function searches for credential files and authenticates using the selected file.
If "hash", it uses a hash file for authentication.
If neither, it prints an error message with usage instructions.
Returns:
None
wmiexec
Executes the Impacket WMIExec tool to run commands on a target system using WMI.
This function performs the following actions:
credentials*.txt
and allows the user to select which file to use for executing the command.
and executes the command with the hash.
Parameters:
line (str): A command argument to determine the authentication mode.
If "pass", the function searches for credential files and authenticates using the selected file.
If "hash", it uses a hash file for authentication.
If neither, it prints an error message with usage instructions.
Returns:
None
extract_ports
Extracts open ports and IP address information from a specified file.
This function performs the following actions:
Parameters:
line (str): The port to get information.
Returns:
None
cron
Schedules a command to run at a specified time.
This function allows users to schedule a command to execute at a specific hour and minute.
If the specified time has already passed for the current day, the command will be scheduled
to run the following day.
Usage:
cron HH:MM command [args]
Parameters:
line (str): The input string containing the scheduled time in 'HH:MM' format followed by the command and arguments.
Returns:
None
pezorsh
Executes the PEzor tool to pack executables or shellcode with custom configurations.
This function enables the user to construct commands for PEzor with various options.
By default, parameters are prompted to ensure successful execution without failure due to
missing values. It supports both executable and shellcode packing with the ability to
select from a range of PEzor flags to create the desired payload.
Functionalities of the function include:
Example commands the function can build:
Usage:
- Run 'PEzor [donut args...]' to pack an executable with donut options.
- Run 'PEzor ' to pack shellcode.
:param line: String containing initial command-line arguments or options.
mimikatzpy
Executes the Impacket Mimikatz tool to interact with a target system for credential-related operations.
This function performs the following actions:
credentials*.txt
and prompts the user to select a file for executing Mimikatz.
the hash for authentication.
Parameters:
line (str): Command argument specifying the authentication mode.
If "pass", the function authenticates using credentials from a selected file.
If "hash", it uses a hash file for authentication.
If neither, it displays an error message with usage instructions.
Returns:
None
rdp_check_py
Executes the RDP check tool to verify credentials or hash-based authentication on a target system.
This function performs the following actions:
credentials*.txt
and prompts the user to select one to execute the RDP check.
using the hash for authentication.
Parameters:
line (str): Command argument specifying the authentication mode.
If "pass", the function authenticates using credentials from a selected file.
If "hash", it uses a hash file for authentication.
If neither, it displays an error message with usage instructions.
Returns:
None
mqtt_check_py
Executes the MQTT check tool to verify credentials on a target system with optional SSL.
This function performs the following actions:
credentials*.txt
and prompts the user to select one to execute the MQTT check.
Parameters:
line (str): Command argument specifying the authentication mode.
If "pass", the function authenticates using credentials from a selected file.
If "ssl", it authenticates using SSL.
If neither, it displays an error message with usage instructions.
Returns:
None
lookupsid_py
Executes the LookupSID tool to perform SID enumeration on a target system.
This function performs the following actions:
credentials*.txt
and prompts the user to select one to execute the SID lookup.
using the selected credentials.
Parameters:
line (str): Command argument specifying the lookup mode.
If "basic", the function performs a standard SID lookup.
If "dc-target", it includes
-dc-ip
and-target-ip
arguments.If neither, it displays an error message with usage instructions.
Returns:
None
scavenger
Executes the Scavenger tool for multi-threaded post-exploitation scanning on target systems with SMB credentials.
This function performs the following actions:
credentials*.txt
,prompts the user to select one, and executes Scavenger using the chosen credentials on a single target IP.
iplist
) and uses Scavenger withcredentials from a selected file on multiple target IPs with the
--overwrite
option.Parameters:
line (str): Command argument specifying the authentication mode.
- If "pass", authenticates with credentials from a selected file on a single target IP.
- If "targets", authenticates on multiple targets from a provided IP list file.
- If neither, displays an error message with usage instructions.
Returns:
None
binarycheck
Performs various checks on a selected binary to gather information and protections.
This function executes the following checks:
Parameters:
line (str): Command argument not used in this function.
Returns:
None
lookupsid
Executes the Impacket lookupsid tool to enumerate SIDs on a target system.
This function performs the following actions:
and prompts the user to select one to execute the lookupsid command.
Parameters:
line (str): Command argument specifying the authentication mode.
If "pass", the function authenticates using credentials from a selected file.
If "hash", it uses a hash file for authentication.
If neither, it displays an error message with usage instructions.
Returns:
None
certipy
Executes the Certipy tool to interact with Active Directory Certificate Services.
This function performs the following actions:
Parameters:
line (str): Command argument specifying the action mode.
If "find", it enumerates AD CS.
If "shadow", it abuses shadow credentials for account takeover.
If neither, it displays an error message with usage instructions.
Returns:
None
follina
Executes the MSDT Follina exploit tool to create malicious documents for exploitation.
This function performs the following actions:
Parameters:
line (str): Command argument specifying the action mode.
- If "default", executes with default parameters.
- If "notepad", executes to pop notepad.exe.
- If "reverse", prompts for a port and executes for a reverse shell.
- If neither, displays an error message with usage instructions.
Returns:
None
sawks
Executes the Swaks (Swiss Army Knife for SMTP) tool to send test emails for phishing simulations.
This function performs the following actions:
Parameters:
line (str): Command argument specifying additional options or the message body.
- If not provided, defaults to a basic test message.
Returns:
None
ad_ldap_enum
Executes ad-ldap-enum to enumerate Active Directory objects (users, groups, computers)
through LDAP, collecting extended information on group memberships and additional AD details.
This function enables the enumeration of Active Directory users, groups, and computers
by executing LDAP queries on a specified domain controller. The command constructed allows
password or Pass-the-Hash authentication, supports SSL/TLS, and IPv4/IPv6 connections,
and outputs data into CSV files detailing domain group memberships and extended user/computer
information.
Functionalities include:
ad-ldap-enum.py
to output detailed information in CSV format.The output files are saved in the current working directory with a prepend if specified.
Example command the function can build:
python3 ad-ldap-enum.py -d scrm.local -l 10.10.11.168 -u ksimpson -p ksimpson -v
Usage:
- Run
dp_ad_ldap_enum
to initiate AD object enumeration using ad-ldap-enum.:param line: String containing initial command-line arguments or options.
unzip
Unzips a specified file from the sessions directory.
This function attempts to locate and unzip a file in the sessions directory.
If a filename is provided as
line
, it will use that; otherwise, it will attemptto retrieve a zip file name based on existing zip files in the user's dictionary.
If the zip file is not found or does not exist in the sessions path, it prints
an error message.
Steps of execution:
line
or user dictionary.Usage example:
unzip filename.zip
:param line: The zip filename to be extracted. If empty, a zip file will be selected
automatically if available.
:return: None
This discussion was created from the release release/0.2.13.
Beta Was this translation helpful? Give feedback.
All reactions