byt3bl33d3r
81ecc32d6c
now accepts a file with a list of targets
2015-08-29 12:26:15 +02:00
byt3bl33d3r
afca0d1e54
now supports IP ranges in addition to IP CIDR's
2015-08-29 12:05:27 +02:00
byt3bl33d3r
f9fd2d54af
usage will now display if called script is called with no arguments
2015-08-28 21:46:54 +02:00
byt3bl33d3r
7e6245389d
added some 1337 ascii art
2015-08-28 21:38:50 +02:00
byt3bl33d3r
d022ca4a55
added colored output
2015-08-28 21:17:46 +02:00
byt3bl33d3r
ae38fe715f
fixed bug were WMI results were not converted to string before printing
2015-08-28 19:21:17 +02:00
byt3bl33d3r
266e0077e3
added option to perform WMI querys using WQL
2015-08-28 18:02:20 +02:00
byt3bl33d3r
3c24c22f4c
Updated README with links to the PS scripts from the PowerSploit project
2015-08-26 14:26:36 +02:00
byt3bl33d3r
b03a41af3f
SMB brute force now diplayes domain if valid account is found
2015-08-26 13:52:07 +02:00
byt3bl33d3r
dcfa80ba5b
Updated secretsdump.py code for Windows 2003 DC support
2015-08-26 13:44:10 +02:00
byt3bl33d3r
258a76b054
Added option to bruteforce SMB accounts
2015-08-22 15:30:34 +02:00
byt3bl33d3r
a09a399f81
fixed indentation
2015-08-21 17:12:07 +02:00
byt3bl33d3r
0a23e6c00c
Merge pull request #5 from gabtremblay/master
2015-08-21 17:05:43 +02:00
Gabriel Tremblay
15de3aaced
Added handling for netbioserror exception when logging out on unsupported server
2015-08-21 10:25:04 -04:00
Gabriel Tremblay
052351fc38
Fixed Requirements
2015-08-21 10:17:17 -04:00
byt3bl33d3r
57ea01c050
added hint to use the drsuapi method
2015-08-21 05:22:49 +02:00
byt3bl33d3r
a8d538f8fb
changed a little text
2015-08-21 05:13:57 +02:00
byt3bl33d3r
128fa758a8
Added support for dumping NTDS.dit via VSS, DRSUAPI and with Invoke-NinjaCopy
2015-08-21 04:55:39 +02:00
byt3bl33d3r
3d42f073cd
Fixed a bug where SMB connections would reset after logging in with a null session
...
Added initial NTDS.dit dumpuing support using DRSUAPI
2015-08-20 23:35:08 +02:00
byt3bl33d3r
bb2e30048f
added install instructions for kali
2015-08-20 13:45:12 +02:00
byt3bl33d3r
691f9c88cd
This should fix #4 , all list and filenames are now encoded to utf8
2015-08-20 10:52:34 +02:00
byt3bl33d3r
aae373c294
it's @agsolino not @agosolino (I'm a dummy)
2015-08-19 23:13:50 +02:00
byt3bl33d3r
9a35b2f097
added links to all of @agosolino's awesome work ;)
2015-08-19 23:09:36 +02:00
byt3bl33d3r
ad1d70848c
Updated README.md
2015-08-19 19:30:57 +02:00
byt3bl33d3r
2705e7e6ab
forgot to censor username and password from readme, oops! (yes I changed them)
2015-08-19 19:26:51 +02:00
byt3bl33d3r
526ace710c
no reason to print execution method if there is no output
2015-08-19 19:24:19 +02:00
byt3bl33d3r
834570bf2f
Made README.md decent
2015-08-19 19:17:54 +02:00
byt3bl33d3r
d77d235ba8
Changed logging level in verbose mode
...
-t option is now required
2015-08-19 17:13:54 +02:00
byt3bl33d3r
415f5cc27e
Added verbose output option
...
Added check to proceed on intrusive options only if provided with user, password or hash
2015-08-19 16:33:56 +02:00
byt3bl33d3r
a16886521b
added --patternfile support for share spidering
2015-08-19 16:17:08 +02:00
byt3bl33d3r
68230fb08a
Added share spidering capability
2015-08-19 16:06:07 +02:00
byt3bl33d3r
3429f4bf83
All three execution methods now support wrting output to a SMB server
2015-08-19 11:47:51 +02:00
byt3bl33d3r
50aa5226d0
added served_over_smb directory
2015-08-17 18:43:55 +02:00
byt3bl33d3r
651c181c83
smbexec and wmiexec now will start an SMB server and use it to read command output if unable to retrieve output from disk
...
changed default method of execution to smbexec
Fixed bug where an unexpected exit would occur if specifying only one target with --mimikatz
2015-08-17 18:40:10 +02:00
byt3bl33d3r
d2f48f6518
Atexec output now gets printed properly
...
session and logged on users enumeration now gets printed inside the greenlet
2015-08-16 23:25:20 +02:00
byt3bl33d3r
2a30cdb34c
Added atexec execution mode: executes commands using RPC calls to the windows task manager
...
Added option to enumerate logged on users via the NetWkstaUserEnum WinAPI call
Added option to enumerate active sessions using the NetSessionEnum WinAPI call
2015-08-16 15:53:08 +02:00
byt3bl33d3r
ea761c23ca
Added list command
2015-08-15 23:40:22 +02:00
byt3bl33d3r
a396b76424
Added upload, download and delete commands
...
Code is now fully concurrent, removed greenlet sync code
If plain text creds are dumped using mimikatz, creds will be parsed and displayed to the user
Full mimikatz output is stored to log files
2015-08-15 22:48:54 +02:00
byt3bl33d3r
d0550fa545
Greenlet Output is now partially synced between threads
...
added temporary logging handler
added options group
2015-08-15 15:32:57 +02:00
byt3bl33d3r
227e858933
initial commit
2015-08-14 16:19:16 +02:00
byt3bl33d3r
b842274743
Initial commit
2015-08-14 16:11:55 +02:00