With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| # Save the transcripts using the "Save Page WE" Chrome Extension | |
| # This script was generated by ChatGPT | |
| import sys | |
| from bs4 import BeautifulSoup | |
| # Check if a file was provided as a command line argument | |
| if len(sys.argv) < 2: | |
| print("Please provide an HTML file as a command line argument.") | |
| sys.exit(1) |
| import type { EditorConfig } from '@editorjs/editorjs' | |
| // The image tool has no types, if using TS you'll need to define them. See below for example | |
| import ImageTool from '@editorjs/image' | |
| import axios from 'axios' | |
| const editorOptions: EditorConfig = { | |
| tools: { | |
| image: { | |
| class: ImageTool, | |
| config: { |
| #!/bin/bash | |
| # | |
| # NAME | |
| # gcp-least-privileged - lists all Google IAM roles which contain the specified permission | |
| # | |
| # EXAMPLE | |
| # gcp-least-privileged compute.disks.delete | |
| # | |
| main() { | |
| local permission |
| import * as bcrypt from "bcrypt"; | |
| import { createCookieSessionStorage, redirect } from "remix"; | |
| import { db } from "./db.server"; | |
| export type LoginForm = { | |
| username: string; | |
| password: string; | |
| }; |
| # https://twitter.com/brsn76945860/status/1171233054951501824 | |
| pip install mmh3 | |
| ----------------------------- | |
| # python 2 | |
| import mmh3 | |
| import requests | |
| response = requests.get('https://cybersecurity.wtf/favicon.ico') | |
| favicon = response.content.encode('base64') |
| Retrieves all of the trust relationships for this domain - Does not Grab Forest Trusts | |
| ([System.DirectoryServices.ActiveDirectory.Domain]::GetCurrentDomain()).GetAllTrustRelationships() | |
| Grab Forest Trusts. | |
| ([System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest()).GetAllTrustRelationships() | |
With kerbrute.py:
python kerbrute.py -domain <domain_name> -users <users_file> -passwords <passwords_file> -outputfile <output_file>With Rubeus version with brute module:
| #!/usr/bin/env python | |
| # Copyright (c) 2012-2018 CORE Security Technologies | |
| # | |
| # This software is provided under under a slightly modified version | |
| # of the Apache Software License. See the accompanying LICENSE file | |
| # for more information. | |
| # | |
| # Gets logged on users via NetrWkstaUserEnum (requires admin on targets). | |
| # Mostly adapted from netview.py and lookupsid.py | |
| # |
A combination of my own methodology and the Web Application Hacker's Handbook Task checklist, as a Github-Flavored Markdown file